Appendix F Enterprise Architecture Artifacts

Size: px
Start display at page:

Download "Appendix F Enterprise Architecture Artifacts"

Transcription

1 Appendix F nterprise Architecture Artifacts he following is a list of the A artifacts that are recommended for use when documenting an enterprise using the A 3 ube Framework. xamples of each artifact are provided on following pages. A 3 ube Level/hread trategic (I) Business (B) (D) (A) s & (I) ecurity () tandards () Workforce kills (W) Artifact ID # Artifact ame (* omposite Artifact) -1 trategic lan* -2 W Analysis -3 oncept of perations cenario -4 oncept of perations Diagram -5 Balanced corecard * B-1 Business lan* B-2 ode onnectivity Diagram B-3 wim Lane rocess Diagram * B-4 Business rocess/ervice odel B-5 Business rocess/ roduct atrix * B-6 Use ase arrative & Diagram B-7 Investment Business ase* D-1 Knowledge anagement lan D-2 xchange atrix* D-3 bject tate-ransition Diagram D-4 bject vent equence Diagram D-5 Logical Data odel D-6 hysical Data odel D-7 Activity/ntity (RUD) atrix * D-8 Data Dictionary / bject Library A-1 ystem Interface Diagram A-2 ystem ommunication Description A-3 ystem Interface atrix * A-4 ystem Data Flow Diagram A-5 ystem/perations atrix * A-6 ystems Data xchange atrix * A-7 ystem erformance atrix * A-8 ystem volution Diagram A-9 Web Application Diagram I-1 onnectivity Diagram I-2 Inventory I-3 apital quipment Inventory I-4 Building Blueprints * I-5 enter Diagram I-6 able lant Diagram I-7 Rack levation Diagram -1 ecurity and rivacy lan* -2 ecurity olutions Description -3 ystem Accreditation Document* -4 ontinuity f perations lan* -5 Disaster Recovery rocedures * -1 echnical tandards rofile -2 echnology Forecast W-1 Workforce lan* W-2 rganization hart W-3 Knowledge and kills rofile An Introduction to nterprise Architecture 3 rd dition 283

2 A 3 Framework Area echnology Business trategy s & Artifact # and ame -1: trategic lan A trategic lan is a high-level policy and planning document that an enterprise uses to document its direction, competitive strategy, most important goals, and the enabling programs and projects (strategic initiatives). he trategic lan covers a future period, usually 3-5 years. Description A trategic lan is a composite A artifact that should guide the enterprise s direction over a 3-5 year period in the future by providing the following items, each of which are primitive (basic) A artifacts. Full versions of abbreviated primitive artifacts are separate artifacts. rovide a ission tatement and a Vision tatement that succinctly captures the purpose and direction of the enterprise. Develop a tatement of trategic Direction that fits the enterprise s purpose, ensures survivability, allows for flexibility, and promotes competitive success. his statement is a detailed description of where the enterprise intends to go. ummarize the results of a W Analysis that is based on the statement of strategic direction and which identifies the enterprise s strengths, weaknesses, opportunities, and threats. he full W analysis is artifact -2. ummarize the situation and planning assumptions for several oncept of perations cenarios that support the enterprise s strategic direction. his summary should include one current scenario that describes at a high-level the coordination of ongoing activities in each line of business, as well as several future scenarios that account for different combinations of internal and external drivers identified through the W Analysis. he complete scenarios are artifact -3. Develop a Diagram that in a single picture captures the essence of and participants in the current operating scenario. his graphic is artifact -4. Develop a General ompetitive trategy for the enterprise that incorporates the current and future scenarios and moves the enterprise in the intended strategic direction in a way that and address internal/external drivers such as culture, line of business requirements, market conditions, competitor strategies, and risk. Identify trategic Goals that will accomplish the competitive strategy, and specify the executive sponsors who are responsible for achieving each goal. Identify trategic and resource sponsors for the initiatives, which are the ongoing programs or development projects that will accomplish each trategic Goal. ummarize utcome easures for each trategic Goal and Initiative, using the Balanced corecard or similar approach. he full scorecard is artifact -5. An Introduction to nterprise Architecture 3 rd dition 284

3 A 3 Framework Area echnology Business trategy s & Artifact # and ame -2: W Analysis he trength, Weakness, pportunity, and hreat (W) Analysis takes a holistic look at the enterprise by identifying internal and external factors which when mapped can reveal areas for improvement and focus. xample ne of the earliest activities the enterprise performs in developing a strategic plan is a trength, Weakness, pportunity, hreat (W) Analysis. his analysis looks at internal and external factors to determine areas that the enterprise should focus on to increase its survivability and success, as well as areas that the enterprise should avoid, or decrease its exposure to. he results of the W Analysis should be summarized in the trategic lan along with the matrix table illustrated below, and the full W Analysis is archived in the A Repository as a separate primitive artifact (-2). he following is an example of a way to summarize a W Analysis. xternal Factors Internal Factors xternal pportunities () 1. ontracting 2. Government 3. ew echnology 4. artnerships xternal hreats () 1. Funding 2. arket Drivers 3. erger 4. Advanced echnology 5. I Adoption Rate Internal trengths () 1. User ommunity 2. Relationships 3. Involved Leadership 4. In-house echnology 5. Legacy Architecture 6. raining Budget 7. ulture 5/3: Legacy Web ortals 1/3: ecurity 1/2: FD Requirements 6/5: I raining 1/5: I Awareness Internal Weaknesses (W) W1. olicy / Regulations W2. Governance Value W3. I kills ystems W4. nterprise Architecture W5. I kills rocess W6. Low Usability/Implementation W W4/4: A haring W W4/1: Funding Data From the identification of Internal trengths (), Internal Weaknesses (W), xternal pportunities (), and xternal hreats () for the enterprise, a matrix arrangement like the example above can help to reveal internal and external areas to focus on. his W Analysis is also used to help enterprise architects and strategic planners to develop oncept of perations () scenarios that detail current and future operating environments. An Introduction to nterprise Architecture 3 rd dition 285

4 A 3 Framework Area echnology Business trategy s & lanning Assumptions 1. ew Video eleconferencing capability. 2. roduct roll-outs at ational conferences. 3. eed to hold detailed product discussions on short notice, globally x7 work availability. 5. Increased suburban commuting and telecommuting. 6. racking of Govt. reports to anticipate product needs. 7. hanging population demographics, driving new product development. 8. Increased cost benefit of solar powered lighting. 9. Additional product features to attract customers 10. Global use of DAs for employee communication. 11. Integration of sales, marketing, and production information. 12. Accurate customer quotes on the fly. Artifact # and ame -3: cenario A oncept of perations cenario is a narrative document that describes how the enterprise operates currently or will operate several years in the future given certain stated internal and external factors identified in the W Analysis. he scenario is footnoted with planning assumptions. xample Jeff Linder, Vice resident of Industrial ales for Danforth anufacturing ompany (D) had just finished a presentation at the 2008 ational Highway afety onference along with Richard Danforth, D s, who had teleconferenced in on the big display screen behind the podium. 1 As Jeff was leaving the main conference room, Andrea ewman, Director of afety and ransportation for the tate of ennessee, asked Jeff if they could talk about the new line of solar-powered highway lights he had just given a presentation on. 2, 3 hanks for taking a minute to talk Jeff. I want to tell you about a situation we have in ennessee and see if your new product line can help said Andrea as they found a table in the refreshment area. 4 o problem, thanks for asking Jeff said. Andrea pulled up a document on her tablet computer and said Jeff, here is a report that shows an increasing number of serious accidents in rural areas of ennessee involving passenger cars and agricultural equipment or commercial trucks. We ve attributed it to the growth of suburban communities further out in the countryside that then depend on two-lane country roads for commuting into the city. 5 When you put slow tractors and trucks together with cars that are in a hurry at all hours to get somewhere, you have a recipe for disaster. Isn t this problem being seen in other places around the country? asked Jeff. Yes, and one of the contributing factors that is consistently coming out of investigations of the night-time accidents is the lack of good lighting on these country roads. 6 I am thinking that your highway grade solar lighting can help us provide more night visibility on high-risk rural roads without needing electrical infrastructure. 7, 8 Jeff thought for a minute before responding. You know, the new line of highway lights has options to incorporate 911 emergency call boxes and Global ositioning ystem (G) equipment that can connect to both tate and local level first responders. 9 his might be useful in also improving response times should an accident occur in spite of the improved lighting. Andrea nodded and said, Yes, I doubt that better lighting will solve the entire problem, but it will help people see each other better, and these other options can improve accident response times. What is the pricing on these units? Jeff pulled his ersonal Digital Assistant (DA) 10 out of his pocket and connected to D s marketing and sales database at headquarters via a satellite Internet link. 11 Andrea, these units are $11,300 each, including the G and 911 features. Andrea took notes and responded, If I can get permission to conduct a pilot test in a couple of months can you provide the lights? Jeff asked How many miles of road? About four miles in the particular area I m thinking of said Andrea. k, the suggested density for the new unit is 18 per mile, so that would be 72 units total. I can give you our 10 percent early-adopter discount, so the total would be $732,240. Let me check what the shipping time would be. Jeff sent a high priority to Bob Green, Vice resident of anufacturing. Bob was in the factory when he received Jeff s on his DA, and after checking the D roduction cheduling ystem, responded two minutes later that a special order for 72 units could be completed and shipped 35 days from when the order is received. Jim relayed this information to Andrea, who said, Wow, that s fast. I have all the information I need to propose the project, I ll get back to you next week 12 An Introduction to nterprise Architecture 3 rd dition 286

5 A 3 Framework Area echnology Business trategy s & Artifact # and ame -4: oncept of perations Diagram A oncept of perations () diagram is a high-level graphical depiction of the how the enterprise functions, either overall, or in a particular area of interest. xample Diagram his Diagram shows at a high level how a fictitious system called the Hurricane Warning ystem would conduct its primary mission of providing a coordinated weather surveillance and reporting capability using land-based, sea-based, airborne, and space-based resources. An Introduction to nterprise Architecture 3 rd dition 287

6 A 3 Framework Area Artifact # and ame echnology Business trategy s & -5: Balanced corecard he Balanced corecard goes beyond financial measures of success for an enterprise and establishes goals and measures in four key business views: ustomer;, Financial; Internal Business rocesses; and Learning and Growth. Description he Balanced corecard suggests that people should view the enterprise from four perspectives, (not just a money perspective) and should develop metrics, collect data, and analyze the enterprise relative to each of these perspectives, as is shown in the figure to the right. he Balanced corecard is a management and measurement system that enables enterprises to clarify their vision and strategy and translate them into action. he scorecard provides feedback around both the internal business processes and external outcomes in order to continuously improve strategic performance and results. When fully deployed, the balanced scorecard transforms strategic planning from an academic exercise into the nerve center of an enterprise. 1 Financial o succeed financially, how should we appear to our shareholders? ustomer Internal Business o achieve our Vision rocesses vision, how and hould we o satisfy our Appear to our hareholders & trategy customers? ustomers, what Business processes ust we excel at? Learning and Growth o achieve our vision, how will we sustain our ability to change and improve? Balanced corecard trategic trategic Initiative 1 Initiative 2 Financial erspective trategic bjective utcome easure 1 utcome easure 2 utput easure A utput easure B utput easure Internal Business rocess erspective trategic bjective utcome easure 1 utcome easure 2 utput easure A utput easure B utput easure ustomer erspective trategic bjective utcome easure 1 utcome easure 2 utput easure A utput easure B utput easure Learning and Growth erspective trategic bjective utcome easure 1 utcome easure 2 utput easure A utput easure B utput easure trategic trategic trategic Initiative 3 Initiative 4 Initiative 5 1 Balanced corecard Institute An Introduction to nterprise Architecture 3 rd dition 288

7 1. A 3 Framework Area echnology Business trategy s & Artifact # and ame B-1: Business lan he Business lan provides a high-level description of the key line of business functions, and financial strategy that will accomplish the strategic goals and initiatives. Description he following items are often found in a Business lan: 1. Business verview 2. xecutive eam rofile 3. Relationship of Business Activities to trategic Goals 4. rganizational tructure 5. arket utlook and ompetitive trategy 6. Business ycles 7. apitalization ummary 8. Financial trategy 9. urrent Financial tatus ummary 10. Business artnerships and Alliances An Introduction to nterprise Architecture 3 rd dition 289

8 A 3 Framework Area echnology Business trategy s & Artifact # and ame B-2: ode onnectivity Diagram he ode onnectivity Diagram shows the operational nodes, activities performed at each node, node-to-node relationships, and information exchanges. he purpose of this diagram is to show, at a high level, who are the operating groups in the enterprise (lines of business) and how they share information. xample erforms: Activity A Activity B ode 1 eedline 1 ype X ode 2 From xternal ource (upply hain) erforms: Activity A Activity eedline 2 ype Y erforms: Activity ode 3 An Introduction to nterprise Architecture 3 rd dition 290

9 A 3 Framework Area echnology Business trategy s & Artifact # and ame B-3: wim Lane rocess Diagram A takeholder Activity Diagram shows which stakeholders (those with a vested interest in the enterprise) are involved with line of business processes, and the timing of that interaction. he diagram uses the format of swim lanes to arrange stakeholders by row, and timeframes by column, then overlaying activities with flowchart symbology. xample An Introduction to nterprise Architecture 3 rd dition 291

10 A 3 Framework Area echnology Business trategy s & Artifact # and ame B-4: Business rocess Diagram A Business rocess Diagram shows a detailed breakdown of an activity, including how each step in the activity relates to the others. he B-4 diagram follows the IDF-0 modeling technique to show what the inputs, controls, outputs, and mechanisms are for each step in the process. Description and xample Inputs: Items that initiate/trigger the activity and ontrols are transformed, consumed, or become part. ontrols: Guide or regulate the activity; usually Inputs utputs Activity indicate when/ how a process will be performed. utputs: he results produced by the activity; the reason for which the process was performed. I echanisms echanisms: ystems, people, and equipment used to perform the activity. IDF-0 activity modeling is suitable for business process documentation in that it provides both high level context views, and more detailed views of each step in the activity in a format that can be further decomposed and interrelated with other processes to show linkages. his type of diagram is useful in showing linkages between steps and internal/external influences, but may not indicate a time sequence. An Introduction to nterprise Architecture 3 rd dition 292

11 A 3 Framework Area echnology Business trategy s & Artifact # and ame B-5: Activity/roduct atrix he Business Activity & roduct atrix maps the lifecycle of revenue-producing products to various lines of business throughout the enterprise. his matrix highlights who owns business processes and products, as well as the extent of supply chains. xample he Activity/roduct atrix maps the lifecycle of each revenue-producing product that the enterprise produces to the line(s) of business that support one or more phases of the product lifecycle. his matrix allows the enterprise to see where the vertical and horizontal (cross-cutting) business product activities are located, as well as to help define ownership of those processes. he B-5 Activity/roduct atrix can then be used with various level artifacts (e.g. D-7 Activity/ntity atrix) to further map the product lifecycle to requirements for data across the enterprise. Business roduct Line of Business A Line of Business B Line of Business Line of Business D Line of Business Line of Business F Line of Business G roduct 1 R F L roduct 2 W D F L roduct 3 W D F L roduct 4 R F L roduct 5 F L roduct 6 W D F Remarks R = Research & Develop W = Warehouse = ervice L = Legal = anufacture D = Distribute F = Financials he product lifecycle illustrated in this example has five sequential stages (research and development, manufacturing, warehouse storage, sales/distribution, and servicing) and two parallel administrative functions (financials and legal). roduct lifecycles are different within most enterprises, and adjustments to the B-5 matrix should be made accordingly. An Introduction to nterprise Architecture 3 rd dition 293

12 A 3 Framework Area echnology Business trategy s & Artifact # and ame B-6: Use ase arrative & Diagram A Use ase narrative follows the Unified odeling Language (UL) format for identifying business requirements, their context, stakeholders (actors), and business rules for their interaction with systems, services, and applications that are identified as technology solutions requiring development. xample An Introduction to nterprise Architecture 3 rd dition 294

13 A 3 Framework Area echnology Business trategy Artifact # and ame B-7: Investment Business ase An Investment Business ase uses a standard format to describe the value, risk, and return on investments made in technology and other resources. he Business ase also contains an alternatives analysis, program performance tracking metrics, architecture information, and security status information. xample 1. ew Requirement. A new requirement for resource(s) or support is identified in a line of business (LB), which is brought to the A and capital planning teams for evaluation. 2. xisting olution heck. he A and capital planning teams determine that an existing A component cannot meet the requirement. 3. ew olution Business ase. he sponsoring LB determines that the requirement is of sufficient importance to merit the cost of developing a business case: Business eed. Describe the requirement in terms of the gap in operational or administrative performance it represents to the LB and the enterprise. Impact if ot Resolved. Describe the impact to the enterprise if the performance gap is not resolved, including strategic, business, and technology impact. Alternatives Analysis. Identify 3 or more viable alternative solutions (if 3 exist). ost-benefit Analysis. Quantify the direct and indirect costs and benefits for each alternative on a lifecycle basis, including qualitative items. s & Return on Investment. Do a RI calculation for each alternative. et resent Value Adjustment. Do a V adjustment for each RI calculation to account for anticipated cost increases over the investment s lifecycle. 4. Business ase valuation. he business case s alternatives are evaluated by the Architecture Working Group (AWG) for the correctness of the analysis, and alignment with the A at each level of the framework. he apital lanning Working Group (WG) then reviews the business case for the correctness of the financial analysis. A coordinated recommendation is made to the executive-level apital lanning Board (B) as to whether the business case should be approved or disapproved. 5. Business ase Approval. he B reviews and approves/disapproves the business case in the context of the enterprise s overall investment portfolio using criteria that identify value from a strategic, business, and technology perspective: 6. Implementation. If the business case is selected (approved) for funding by the B, the proposed solution becomes an implementation project that is managed by the sponsoring LB. he project is reviewed by the B at key milestones and/or periodically as part of the capital planning process oversight of all projects. An Introduction to nterprise Architecture 3 rd dition 295

14 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-1: Knowledge anagement lan he Knowledge anagement (K) lan provides a detailed description of how knowledge, information, and data are shared across the enterprise. he K lan includes descriptions and diagrams of information sharing between systems, applications, knowledge warehouses, and databases Description and xample K lan ontents he approach to managing data, information, and knowledge across the enterprise How data and information-sharing support the Business lan Data and information-sharing strategies and diagrams for each line of business Data and information sharing strategies with external partners and customers Which types of data in the enterprise require extra protection he lifecycle for data and information that is key to the success of the enterprise (data creation, sharing, updating, storage, retrieval, and deletion) xample of a High Level K Diagram An Introduction to nterprise Architecture 3 rd dition 296

15 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-2: xchange atrix he xchange atrix describes relevant attributes of data exchanges between systems. hese attributes include size, logical specification of the information i.e., media, timeliness required, and the security classification and properties of the information. xample exchanges express the relationships across four important aspects of the architecture (information, activities, locations, and times) with a focus on the specific aspects of the information flow. exchanges identify which business nodes exchange what information during the performance of what activities and in response to which events. Additional information on who is performing the activity can be added, if needed for security analysis. he detailed information in the xchange atrix may be hard to collect but it is necessary to fully understand the information flow in the enterprise and its security aspects. he matrix also identifies the event that triggers the information exchange (e.g., set schedule or citizen request). he matrix keys the exchange to the producing and using activities and nodes and to the needline (from the ode onnectivity Diagram) the exchange satisfies. he xchange atrix partitions each high-level needline into its component parts, i.e., into distinct information exchanges between business nodes. An example format for this artifact is provided below. Additional characteristics may be added to the D-1 matrix based on the purpose or goals of the enterprise. 1 IFRAI DRII UR DI- AI IFRAI XHAG ARIBU DLI IDIFIR IFRAI XHAG A/ID DIA IZ DIG D DIG AIVIY RIVIG D RIVIG AIVIY RIGGRIG V FRQUY ILI HRUGHU URIY IRR- ABILIY RQUIR DIGIAL, VI, X, RAG LII IAG,. 1 K. owell and A. Reedy An Introduction to nterprise Architecture 3 rd dition 297

16 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-3: bject tate ransition Diagram A tate ransition Diagram uses the notation from the Unified odeling Language to show how the lifecycle of a specific data object. his diagram shows changes to attributes, links, and/or behavior(s) of the n-line rder object that are a result of internal or external system events which trigger changes in state. xample lace -rder n-line order entry/ calculate line total, do/display line total rder checked heck tock heck stock/ nter/ calculate order total, do/display order total ut of tock ancel order ancelled ntry/adjust register do/display refund n-line ayment (amount) tart he Lifecycle of he n-line rder bject (Item#, Qty/ Reset Register) ake -ayment -payment entry/calculate Balance, do/display balance, exit/pay balance ull tock (quantity) rder rocessing Do/prepare ordered items for shipment Item(s) shipped Finish Delivered ntry/adjust register do/display refund An Introduction to nterprise Architecture 3 rd dition 298

17 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-4: bject vent race Diagram he vent-race Diagram allows the tracing of actions in a set of scenarios or operational threads. ach model should focus on a critical sequence of events and a description of this scenario should accompany the model. xample With time proceeding from the top of the diagram to the bottom, a specific diagram lays out the sequence of information exchanges that occur between business nodes for a given scenario. hese information exchanges are associated with events and actions (see xchange atrix). he direction of the event arrows shows flow of control, in terms of the business process, from node to no. 1 D V/I D 1 D 2 D 3 event 1 at time 1 {formula relating time 1 to time 2} event 2 at time 2 essage 1 essage 2 event 3 at time 3 {formula relating time 3 to time 3'} time 3' time 4 essage 3 essage 4 essage 5 essage 6 time n essage 7 essage 8 1 K.owell and A. Reedy, 2001 An Introduction to nterprise Architecture 3 rd dition 299

18 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-5: Logical Data odel A semantic data model can be developed using traditional structured methods and symbology (ntity Relationship Diagram), or one can use the object-oriented method and symbology of the Unified odeling Language (UL), which produces a lass Diagram and/or bject Diagram. xample lass Diagram (shows the static structure of a system) Dog wner lasses Link ame olor ex Barks ats Association ame Address hone Feeds errier ame olor ex Barks ats oodle ame olor ex Barks ats bjects U Keybd onitor (with inheritance of attributes) xample of Aggregation, which expresses a art-of relationship between a component object and an aggregate object An Introduction to nterprise Architecture 3 rd dition 300

19 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-6: hysical Data odel he hysical Data odel is used to describe how the information represented in the Logical Data odel is actually implemented in automated information systems. xample here should be a mapping from a given Logical Data odel to the hysical Data odel (D). he D is a composite model whose components can vary greatly, as shown in the template below. For some purposes, an entity-relationship style diagram of the physical database design will suffice. he Data Definition Language may also be used in the cases where shared databases are used to integrate systems. References to message format standards (which identify message types and options to be used) may suffice for messageoriented command and control subsystems. Descriptions of file formats may be used when file passing is the mode used to exchange information. Interoperating systems may use a variety of techniques to exchange data, and thus have several distinct partitions in their D with each partition using a different form. hysical Data odel rovides essage Format: - tandards Reference - essage ype(s) - essage Fields with Representation - ap From the Logical Data odel to the essage Fields File tructure: -tandards Reference -Record and File Descriptions -ap from Logical Interface odel to Record Fields hysical chema: -DDL or RA otation with sufficient detail to generate the schema -ap from the Logical Data odel to the hysical Data odel with Rationale 1 K. owell and A. Reedy, 2001 An Introduction to nterprise Architecture 3 rd dition 301

20 A 3 Framework Area echnology Business trategy s & Artifact # and ame D-7: Activity/ntity atrix An Activity/ntity atrix is developed by mapping which data entities are affected by related line of business activities. ften called a RUD atrix because it identifies the basic types of transformations that are performed on data (reate, Read, Update, Delete) through a business process. xample 5 ntity-activity atrix ntity-activity (RUD) atrix: tock Item tock Receive new stock ontrol U Receive customer order R Issue customer with goods Issue monthly statement Receive faulty goods rder new printed catalog rder new stock R ail catalog to customer ntity ype Invoice Invoice Line Item ustomer ustomer R U U R R R R onthly tatement Warehouse R ntity-activity atrix (RUD): =reate, R=Read, U=Update, D=Delete heck matrix that: Is every entity affected by at least one activity, if not, it s singular and should be dropped? Is there just one reate activity for each entity? ote that reate may be a boundary activity, that may have happened through internal processes. atalog atalog roduction atrix may be used to: Define the scope of the problem Describe a system map artition the system (luster Analysis) Determine who owns the data and/or processes (activities) An Introduction to nterprise Architecture 3 rd dition 302

Integrated Information System for Food grains Management IISFM*

Integrated Information System for Food grains Management IISFM* Integrated Information ystem for Foodgrains Management IIFM Integrated Information ystem for Food grains Management IIFM* 1 Ranjna Nagpal, r ech Director, NIC, NC of Delhi ranjna@nic.in, ranjnan@gmail.com

More information

Managing Complex Outsourced Projects

Managing Complex Outsourced Projects New Book Published by H Incorporated Managing omplex Outsourced Projects By: regory. arrett, PM, PMP Winner of PMI s Project Management xcellence ward Quick Results urvey Question #1 Which of the following

More information

Distributed DBMS optimized for processing your business data including time series log data collected in real time.

Distributed DBMS optimized for processing your business data including time series log data collected in real time. www.mobigen.com istributed B optimized for processing your business data including time series log data collected in real time. Effective data analysis through intelligent automatic analysis Guaranteeing

More information

Capacity Plan. Template. Version X.x October 11, 2012

Capacity Plan. Template. Version X.x October 11, 2012 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business

More information

Management Information Systems

Management Information Systems hapter No SSU/Q/ hapter No Foundations of Information Systems in usiness atch ompiled y: Muzammil hmad Khan Muhammad Kashif Shaikh ompiled y: Muzammil hmad Khan & Kashif Shaikh S7 : ourse Objectives: Upon

More information

PHASE 5: DESIGN PHASE

PHASE 5: DESIGN PHASE PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed

More information

O VERVIEW. Purpose. Project Life Cycle

O VERVIEW. Purpose. Project Life Cycle Project Management Process O VERVIEW Purpose The purpose of this document is to provide a high level overview of a standard project management process for Information and Communications Technology. A full

More information

ITIL (IT Infrastructure Library) B y John Parshall

ITIL (IT Infrastructure Library) B y John Parshall ITIL (IT Infrastructure Library) B y John Parshall Welcome My Background Currently the IT Director at La Crosse County Worked in IT for 20 years M anagement for 10 years Cheese Maker for 10 years Graduate

More information

Self-Paced Virtual Classes (SPVC) & Web-Based Training (WBT) Courses - 2015 Enterprise Licensing of IBM SPVC & WBT available

Self-Paced Virtual Classes (SPVC) & Web-Based Training (WBT) Courses - 2015 Enterprise Licensing of IBM SPVC & WBT available mstar echnologies vt. td., Ground Floor,.M. Building, 7th Mile,.M. Industrial state, Garvebhavipalaya, Bangalore - 560 068, India. -mail: training@amstar.in; Web: www.amstar.in H: +91-80-42242249 / +91-80-65368005

More information

Optimizing Human Capital Development

Optimizing Human Capital Development Distribution Research Consortia INDUTRIAL DITRIBUTION PROGRAM Dwight Look College of Engineering Optimizing Human Capital Development Achieving Distribution Competitive Advantage through People: Best Practices

More information

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood

Enterprise Architecture 101. (Includes numerous samples/ templates produced using TOGAF methodology) Shail Sood Enterprise Architecture 101 (Includes numerous samples/ templates produced using TOGAF methodology) Enterprise Architecture Key Question What is Enterprise Architecture? Why Enterprise Architecture? What

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical

More information

Datacenter Migration Think, Plan, Execute

Datacenter Migration Think, Plan, Execute Datacenter Migration Think, Plan, Execute Datacenter migration is often regarded as a purely technical, almost trivial side-project, to be delivered by existing IT staff alongside their day jobs. With

More information

n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment 2 posted n Due Thursday 2/26

n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment 2 posted n Due Thursday 2/26 Class Announcements TIM 50 - Business Information Systems Lecture 14 Instructor: John Musacchio UC Santa Cruz n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment

More information

Applying CMMI SM In Information Technology Organizations SEPG 2003

Applying CMMI SM In Information Technology Organizations SEPG 2003 Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

An Introduction To: Maintenance Management Information exchange Model (MMIXM)

An Introduction To: Maintenance Management Information exchange Model (MMIXM) Global Information Management An Introduction To: Maintenance Management Information exchange Model (MMIXM) resented By: Dan Galgano & Virgil imms Date: August 27, 2015 Opening Remarks The FAA, along with

More information

Benefits of Global Operations. Upgrading the Strategic Role Focus on intangible benefits. Types of Product or Service Factories

Benefits of Global Operations. Upgrading the Strategic Role Focus on intangible benefits. Types of Product or Service Factories 1 Benefits of Global Operations Offshoring Opportunities angible Intangible educe Direct and Indirect Costs educe Capital Cost educe axes educe Logistics Costs Overcome ariff Barriers Provide Better Customer

More information

Appendix 2-A. Application and System Development Requirements

Appendix 2-A. Application and System Development Requirements Appendix 2-A. Application and System Development Requirements Introduction AHRQ has set up a Distributed Systems Engineering Lab (DSEL) to support all internal development efforts and provide a facility

More information

Agency Centralized IT Reference Model

Agency Centralized IT Reference Model Agency Centralized IT Reference Model For State of Minnesota Agencies Planning and Version 2.0 March 8, 2012 658 Cedar Street Saint Paul, MN 55155 www.oet.state.mn.us PROVIDING THE LEADERSHIP AND SERVICES

More information

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Scott A. Bernard, Ph.D. Scott_Bernard@omb.eop.gov Federal Chief Enterprise Architect Executive Office

More information

Applying Business Architecture to the Cloud

Applying Business Architecture to the Cloud Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support

More information

PROJECT MANAGEMENT METHODOLOGY SECTION 3 -- PLANNING PHASE

PROJECT MANAGEMENT METHODOLOGY SECTION 3 -- PLANNING PHASE PROJECT MANAGEMENT METHODOLOGY SECTION 3 -- PLANNING PHASE Table of Contents Introduction...3-1 Overview...3-1 The Process and the Project Plan...3-1 Project Objectives and Scope...3-1 Work Breakdown Structure...3-1

More information

How To Plan For A Disaster At The University Of Texas

How To Plan For A Disaster At The University Of Texas Disaster Recovery Planning The Process Introduction We began our planning processes after experiencing several disasters, including a building fire, an environmental contamination, faulty discharge of

More information

Use Case Diagrams. Tutorial

Use Case Diagrams. Tutorial Use Case Diagrams Tutorial What is a use case? A requirements analysis concept A case of a use of the system/product Describes the system's actions from a the point of view of a user Tells a story A sequence

More information

How To Develop An Enterprise Architecture

How To Develop An Enterprise Architecture OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY

More information

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER Disasters or accidents would cause great harm on network infrastructure. It is unavoidable and the operation of network would be hampered for a long

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

System Architecture Review Glossary

System Architecture Review Glossary AAP Architect ASAI Availability Bulk Mail Business Case Review Change Management Chief Enterprise Architect Application Architecture Planning. Replaced by the SAR (System Architecture Review) process,

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Documentation for data centre migrations

Documentation for data centre migrations Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

COMMUNITY SERVICES CONTRACT MANAGEMENT PRACTICE GUIDE

COMMUNITY SERVICES CONTRACT MANAGEMENT PRACTICE GUIDE MMUY RV RA MAAGM PRA GUD A Guide to Managing ervice Agreements under the Delivering ommunity ervices in Partnership Policy Document Version: 2 Version Date: Page 1 able of ontents 1: RDU... 3 Purpose of

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

ARIS Design Platform Getting Started with BPM

ARIS Design Platform Getting Started with BPM Rob Davis and Eric Brabander ARIS Design Platform Getting Started with BPM 4y Springer Contents Acknowledgements Foreword xvii xix Chapter 1 An Introduction to BPM 1 1.1 Brief History of Business Process

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary

More information

Network Configuration Management

Network Configuration Management Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library

More information

GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning

GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO United States General Accounting Office Accounting and Information Management Division August 1998 Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO/AIMD-10.1.19 Preface

More information

U.S. Department of the Treasury. Treasury IT Performance Measures Guide

U.S. Department of the Treasury. Treasury IT Performance Measures Guide U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)

More information

ELEVATOR MONITORING & CONTROL SYSTEM

ELEVATOR MONITORING & CONTROL SYSTEM & n recent years, the need for a monitoring system utilizing network technology has increased. n largescale international airports, for example, interfacing with the building and facility management control

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

SACWIS PLANNING FOR DEPARTMENT OF HUMAN SERVICES DRAFT - STRATEGIC IMPLEMENTATION PLAN: MILESTONES & TIMELINES FOR A FULL IMPLEMENTATION

SACWIS PLANNING FOR DEPARTMENT OF HUMAN SERVICES DRAFT - STRATEGIC IMPLEMENTATION PLAN: MILESTONES & TIMELINES FOR A FULL IMPLEMENTATION STATE OF MICHIGAN SACWIS PLANNING FOR DEPARTMENT OF HUMAN SERVICES DRAFT - STRATEGIC IMPLEMENTATION PLAN: MILESTONES & TIMELINES FOR A FULL IMPLEMENTATION September 13, 2010 DRAFT -Strategic Plan: Key

More information

Develop Project Charter. Develop Project Management Plan

Develop Project Charter. Develop Project Management Plan Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

Service Catalogue. Creation Date

Service Catalogue. Creation Date Catalogue Creation Date Notes: The following template is provided for writing a Catalog document. [Inside each section, text in green font between brackets is included to provide guidance to the author

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB

Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB Value to the Mission FEA Practice Guidance Federal Enterprise Program Management Office, OMB November 2007 FEA Practice Guidance Table of Contents Section 1: Overview...1-1 About the FEA Practice Guidance...

More information

Juniper Networks Secure

Juniper Networks Secure White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...

More information

MicroStrategy Narrowcast Server. System Administrator Guide

MicroStrategy Narrowcast Server. System Administrator Guide Microtrategy arrowcast erver ystem Administrator Guide Version 9.4 wenty-sixth dition, version 9.4 o ensure that you are using the documentation that corresponds to the software you are licensed to use,

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Design Document Version 0.0

Design Document Version 0.0 Software Development Templates Design Document Version 0.0 Description of Project DOCUMENT NO: VERSION: CONTACT: EMAIL: Ivan Walsh DATE: 4/13/2004 Distribution is subject to copyright. Design Document

More information

Business Process Automation

Business Process Automation usiness White aper eries LH F Y D V. LD. usiness rocess utomation n alpha nformation ystems ndia vt. Ltd. erspective eed help energizing your enterprise computing needs? Give us a call at +91-836-4251105,

More information

Project Management Planning

Project Management Planning Develop Project Tasks One of the most important parts of a project planning process is the definition of activities that will be undertaken as part of the project. Activity sequencing involves dividing

More information

JUN 2012. Technology Services. Peak Metrics Report Out D E N V E R PERFORMANCE

JUN 2012. Technology Services. Peak Metrics Report Out D E N V E R PERFORMANCE JUN Technology Services D E N V E R Vision Alignment Citywide Vision: We will deliver a world-class city where everyone matters. Agency Vision : We will become the nation s model for delivery of technology,

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

performs a variety of complicated tasks, may lead and direct the work of others, may report directly to a project

performs a variety of complicated tasks, may lead and direct the work of others, may report directly to a project State of Iowa-IT Services-Position Descriptions Levels of Experience The following levels of experience apply to all job categories unless a job category details other requirements (example Data Entry).

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,

More information

Work Breakdown Structure

Work Breakdown Structure Work Breakdown tructure projectethod he ltimate ethodology urrent tep: ext tep: rev tep: Define cope Develop chedule ssign roject anager Work Breakdown tructure se this template to create a Work Breakdown

More information

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0

More information

Architecting the Cloud: Enterprise Architecture Patterns for Cloud Computing

Architecting the Cloud: Enterprise Architecture Patterns for Cloud Computing Architecting the Cloud: Enterprise Architecture Patterns for Cloud Computing Prakash C. Rao VP/Chief Architect MMC Ltd Claudia Rose President/BBII Enterprises Faculty: FEAC Institute A tough place to be!

More information

Appendix A4. AUTOMATED EMPLOYEE SCHEDULING SYSTEM (AESS) Technical Requirements

Appendix A4. AUTOMATED EMPLOYEE SCHEDULING SYSTEM (AESS) Technical Requirements Appendix A4 AUAED EPLYEE SCHEDULING SYSE (AESS) echnical s hese requirements are intended to provide general information only and are subject to revision. he rights and obligations of any party contracting

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

<name of project> Software Project Management Plan

<name of project> Software Project Management Plan The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Custom Application Development

Custom Application Development Business White aper eries H FR Y.. ustom pplication evelopment n alpha nformation ystems ndia vt. td. erspective eed help energizing your enterprise computing needs? Give us a call at +91-836-4251105,

More information

MANAGING USER DATA IN A DIGITAL WORLD

MANAGING USER DATA IN A DIGITAL WORLD MANAGING USER DATA IN A DIGITAL WORLD AIRLINE INDUSTRY CHALLENGES AND SOLUTIONS WHITE PAPER OVERVIEW AND DRIVERS In today's digital economy, enterprises are exploring ways to differentiate themselves from

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation)

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation) Data Center Migration Primer Mark Smith Wednesday, June 27, 2012 General Information Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today

More information

Disaster Recovery & Business Continuity Dell IT Executive Learning Series

Disaster Recovery & Business Continuity Dell IT Executive Learning Series Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY

More information

White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary

White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

POSITION DESCRIPTION

POSITION DESCRIPTION OSITION DESITION TITLE: rojects ortfolio Manager DEATMENT: Strategy, lanning, rograms, isk & ompliance (S) OGANISATION: GDF SUEZ Hazelwood DATE: September 2014 JOB HOLDE: - MANAGE: Strategy, lanning, rograms,

More information

System Requirements Specification (SRS) (Subsystem and Version #)

System Requirements Specification (SRS) (Subsystem and Version #) of the (Subsystem and Version #) () (Document Revision Number) Contract (No.) Task (No.) GSA Contract (No.) Prepared for: The United States Department of Agriculture Food & Nutrition Service (FNS)/ Information

More information

What We Will Cover In This Module

What We Will Cover In This Module ITIL Considerations What We Will Cover In This Module General Concepts Around ITIL (V3) Supporting Processes Principles ITIL Implementation Life Cycle Getting Started With A Practical Approach Why Service?

More information

Using OLAP and Data Mining Technologies for Trending, Knowledge Discovery, and Collaborative Commerce

Using OLAP and Data Mining Technologies for Trending, Knowledge Discovery, and Collaborative Commerce U + U L K Using LP and ata ining echnologies for rending, Knowledge iscovery, and ollaborative ommerce Jane riffin, anaging irector KP onsulting ccurate usiness Facts U + UL K ompanies face an increasingly

More information

HHSN316201200042W 1 QSSI - Quality Software Services, Inc

HHSN316201200042W 1 QSSI - Quality Software Services, Inc ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

More information

AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST. Lecture 1. 21.10.2014, Tuesday

AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST. Lecture 1. 21.10.2014, Tuesday AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST Lecture 1 21.10.2014, Tuesday 2 A Series of Lectures 1.The Role of the Systems 2.Project Planning and Project Management

More information

Strategic Plan FY 2014-2016

Strategic Plan FY 2014-2016 Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

Ames Consolidated Information Technology Services (A-CITS) Statement of Work Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and

More information

ITSM Tool Specification Overview

ITSM Tool Specification Overview IT Tool pecification Overview Purpose The purpose of this document is to set the vision for the IT tool and to act as the specification used to shortlist potential tools. ithin ICT at the Authority we

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

Department of Administration Portfolio Management System 1.3 June 30, 2010

Department of Administration Portfolio Management System 1.3 June 30, 2010 E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2

More information