System Architecture Review Glossary



Similar documents
Applying CMMI SM In Information Technology Organizations SEPG 2003

FUNCTIONAL AREA 12. Network Administration (NET)

Bridge Development and Operations for faster delivery of applications

Asset management guidelines

Introduction to SOA governance and service lifecycle management.

Blackhawk Technical College. Information Technology Services. Process Improvement Visioning Document

Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples

Cisco and VMware Virtualization Planning and Design Service

General Computer Controls

Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January PPM Project Type Custom Development

CONDIS. IT Service Management and CMDB

Why cloud backup? Top 10 reasons

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) Fax: (718)

The Role of the Software Architect

Domain modeling: Leveraging the heart of RUP for straight through processing

Chap 1. Introduction to Software Architecture

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

Database Administrator [DBA]

IT Services Management Service Brief

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Disaster Recovery Plan

Realizing business flexibility through integrated SOA policy management.

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

Program Lifecycle Methodology Version 1.7

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Assistant Information Technology Specialist. X X X software related to database development and administration Computer platforms and

IBM Tivoli Netcool network management solutions for enterprise

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

IT Service Continuity Management PinkVERIFY

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 ( /5049/5050) Course KC Days OVERVIEW COURSE OBJECTIVES AUDIENCE

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

WHY CLOUD BACKUP: TOP 10 REASONS

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

HA / DR Jargon Buster High Availability / Disaster Recovery

Draft Information Technology Policy

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

Configuration Management System:

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

DCIM Software and IT Service Management - Perfect Together

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense

Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville

How To Write An Slcm Project Plan

In the case of the online marketing of Jaro Development Corporation, it

ICT budget and staffing trends in the UK

Chapter 6 Essentials of Design and the Design Activities

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Protect Microsoft Exchange databases, achieve long-term data retention

AGILE SOFTWARE TESTING

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers

THE NEXT GENERATION CMDB - ALIGNING IT TO BUSINESS

FLORIDA COURTS E-FILING AUTHORITY HELP DESK POLICIES & PROCEDURES

IT Organisation in Change

Address IT costs and streamline operations with IBM service desk and asset management.

Security in Space: Intelsat Information Assurance

Support and Service Management Service Description

SECTION 15 INFORMATION TECHNOLOGY

How To Ensure The C.E.A.S.A

IT - General Controls Questionnaire

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

5 CMDB GOOD PRACTICES

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

Developing SOA solutions using IBM SOA Foundation

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Optimos Enterprise Helpdesk Automation Solution Case Study

HIPAA Security Alert

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

White Paper. Securing and Integrating File Transfers Over the Internet

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

EMA CMDB Assessment Service

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

General IT Controls Audit Program

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

INFORMATION SYSTEMS SPECIALIST

Datacenter Management and Virtualization. Microsoft Corporation

How To Integrate Legacy Management With Distributed Systems

Subject: Information Technology Configuration Management Manual

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Transcription:

AAP Architect ASAI Availability Bulk Mail Business Case Review Change Management Chief Enterprise Architect Application Architecture Planning. Replaced by the SAR (System Architecture Review) process, AAP was an architectural review of the application, usually after the design stage, held with the developer and Solutions Architects. A role responsible for vision, planning, and guiding efforts in a domain or technology. Enterprise Domain Architects focus on an enterprise domain, while Technology Architects focus on a technology. Automated Server Application Inventory. An in-house developed application that collects information on hardware installed or supported within the OIT infrastructure, and applications that run on them. The extent to which data should be accessible by the parties intended. * Delivers a single mailing to 50 or more recipients outside of the GSN * Generates 100 or more different messages to recipients outside the GSN within a single job stream. * Any marketing email that delivers opt-in messages outside the GSN. Formerly called the Conceptual System Architecture Review, this process and associated documentation, establishes the business case for the project, defines the high level scope, discusses solutions, identifies risks and provides a high level schedule. This is the first phase of the PIPE Line process. In large projects, this meeting will take place during RFP design. Change management, at OIT, is defined as the process that insulates the information technology environments from the negative impact of changes that are potentially disruptive or have significant risk associated with them. It is the ongoing process of communicating, coordinating, scheduling, monitoring and controlling changes to those environments. The Chief Architect is responsible for leading and facilitating the creation of the state s architecture to achieve the following: * Increased value and effectiveness per dollar spent * Organizing logic for business processes and information technology * of the state s desired level of integration and standardization * Strategic use of emerging technologies to better manage the enterprise s information and consistently insert those technologies into the enterprise The primary role of the Chief Architect is to inform, guide, and influence the architecture decisions for OIT and the enterprise, especially those related to IT investments. Last revised: 1/15/2015 9:24 AM Page 1 of 8

Conceptual Data Model Conceptual SAR Confidentiality Construction Phase COTS Criticality Data Architect Database Architect Disaster Recovery Disaster Restoration Point Objective Disaster Restoration Time Objective EADI Conceptual Data Models are also referred to as subject area models. They represent a high level perspective of a subject area (realm) important to the business without regard to technology. This level of detail should just touch the complexity of the business, not delve into it. See Business Case Review. The extent to which data should be limited only to the parties intended. This phase occurs after Elaboration and authorization to proceed, and is where the application is built and unit-tested. A Physical System Architecture Review is performed during this phase, and detailed documentation and deployment plans are prepared at the conclusion of this phase. Commercial Off The Shelf software package. The degree to which a loss of the system or its data has the potential to result in harm or loss to the State or stakeholders. It is based upon the nature of the service, the risk to the State or stakeholders if it is interrupted and the ability, if any, to conduct business operations manually. The Data Architect is a solutions architect responsible for the creation and maintenance of the State s logical data model and for the consistent naming and definition of logical and physical data objects. In the SAR process, the Data Architect reviews the logical and physical designs of project data modelers to make sure that existing data structures and sources are leveraged, new data structures are integrated, and inconsistent data definitions are avoided. The Database Architect is a solutions architect responsible for the planning of the State s physical database management system (DBMS) hosting. In the SAR process, the Database Architect reviews the DBMS logical and physical requirements to make sure that the existing hosting environment is leveraged, new software is properly installed and configured as needed, and inconsistent deployments are avoided. A plan for duplicating computer operations after a catastrophe occurs, such as fire, flood or earthquake. It include routine off-site backups as well as a procedure for activating vital information systems in a new location. The greatest acceptable time since the last stable, available copy of the data to be restored at the disaster recovery system can be utilized, after which as a result of the data center failure, data will have been permanently lost and cannot be recreated. The expected time to recover the IT service at the disaster recovery site after an outage caused by a data center failure. Enterprise Application Development and Integration. Formerly known as Application Development and Maintenance, this unit has been, and continues to be, the backbone for OIT. The new name of the unit reflects its increased focus on the area of systems integration. Last revised: 1/15/2015 9:24 AM Page 2 of 8

Elaboration Phase Engineer Enterprise Architects Enterprise Domain Architects Entity ERD Framework GSN This phase occurs after Inception and authorization to proceed and is where detailed requirements are gathered with a logical perspective. A Logical System Architecture Review is performed during this phase, and a detailed project design, cost estimate and schedule are prepared at the conclusion of this phase. Team Leaders and Subject Matter Experts for a project. Focused on the physical design and implementation. Also called a Technology Engineer. Abstract thinkers with a broad perspective, focused on the future to build a strong yet flexible foundation for all solutions and establish the principles needed to affect this result. The Enterprise Architect coordinates the efforts of the four high-level domain architects (Business, Application, Information, Infrastructure) to create a cohesive enterprise architecture. Characterized as having an "Enterprise" or institutional orientation rather than technology focus, the Enterprise Domain Architect ensures that the institution has the means to leverage its knowledge resources; possesses in-depth knowledge of enterprise information resource management (knowledge management); develops and sustains the enterprise domain architecture (plan); establishes plans, strategies and standards for data/domain management, database management, data management tool administration; introduces new industry practices for knowledge management; has familiarity with knowledge management technologies but may not possess in-depth technical knowledge, supervising the technical staff that does. In data modeling (a first step in the creation of a database), an entity is some unit of data that can be classified and have stated relationships to other entities. In relation to a database, an entity is a single person, place, or thing about which data can be stored. An entity-relationship diagram is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system. A software framework is a re-usable design for a software system (or subsystem). This may include support programs, code libraries, a scripting language, or other software to help develop and glue together the different components of a software project. Various parts of the framework may be exposed through an Application Programming Interface (API). Garden State Network; a multi-agency, multi-protocol network across New Jersey. This network supports State agencies through dedicated and switched services in support of centralized and distributed data processing applications resident in mainframe, mini-computer, local area network (LAN), and personal computer environments. The GSN also provides Internet and email services. Last revised: 1/15/2015 9:24 AM Page 3 of 8

High Availability HIPAA Identity Management Architect Implementation Review Inception Phase Information Architect Integrated Planning Process Integrity IOPS Information Technology Infrastructure Library KPI The ability of an application to continue to function in the face of predictable or expected events without interruption, or with only minimal interruption and recovery. Health Insurance Portability and Accountability Act (HIPAA) enacted by Congress in 1996. The person responsible for developing a coherent set of standards, policies, certifications and management activities aimed at providing a context for implementing a digital identity infrastructure that meets the goals and objectives of current business needs and is capable of evolving with the business to ensure that the infrastructure continues to meet business needs. This is the fourth phase of the PIPE Line process. It assures that the project has met all the necessary requirements to move from the development phase to the production phase. Dates for deployment, impact on other systems and related deployment activities have been assigned. This phase occurs after Initiation, and is where high-level requirements are gathered with a conceptual perspective. A Conceptual System Architecture Review (SAR) is performed during this phase, and a highlevel project cost estimate and schedule are prepared at the conclusion of this phase. The Information Architect is an enterprise domain architect and part of the Enterprise Architecture team. The Information Architect is responsible for the definition and use of the State s Common Information Architecture to manage data quality and provide efficient delivery of rationalized information to business management. In the SAR process, the Information Architect reviews conceptual designs to make sure that existing architecture components are leveraged, new components are integrated, and inconsistent architecture is avoided. A process that facilitates the intake of work, provides visibility to management of current workload, feeds the Information Technology Infrastructure Library (ITIL) processes and the Project Initiation, Planning and Execution Line (PIPE Line) Process, formerly known as the System Architecture Review (SAR). The extent to which data must be protected from unauthorized alteration and the context of the data must be maintained. IOPS is the standard unit of measurement for input/output operations per second. A set of concepts and policies for managing Information Technology infrastructure, development and operations. Key Performance Indicator; quantifiable measurements, agreed to beforehand, that reflect the critical success factors (of the company, department, project.) Last revised: 1/15/2015 9:24 AM Page 4 of 8

Logical Business Model Logical Data Model Logical Design Document Logical Infrastructure Diagram Logical SAR Master Reference Data NCC NJ CDA NJ CIA Operational Objective A Logical Business Model (LBM) is the data model for a business subject area. It is a fully attributed view that documents both relationships and unique identifiers. It does not reference the characteristics of a particular database system or the physical storage of data. Logical Data Models (LDM) are also referred to as business models. An LDM captures the data and rules that identify how the business works in the form of an Entity-Relationship Diagram (ERD). It is logical, in that it is independent of a particular system or technology. All rules and terms are combined into more generic forms where possible. AN LDM should identify all data elements within its scope. It should capture and document all business rules that describe data or its relationships, even if those rules are not easily shown, or cannot be shown at all, within an ERD. The models, workflows, transition-state diagram, and other artifacts that represent the logical design of the application without regard to the physical implementation of any of the components or the technology platform upon which they are implemented. The logical diagram shows the infrastructure architecture including the following information: Domain hierarchy, server roles, trust relationships The second phase of the PIPE Line process, the Logical System Architecture Review is held during the Elaboration Phase and views the logical design of the application without regard to the physical implementation of any of the components, or the technology platform upon which they are implemented. At this point in the process, no code should have been written. Master reference data is common lookup data shared over a number of systems. Examples might include State abbreviations, County or Municipality names. The Enterprise Help Desk / Network Call Center is staffed 24 hours a day, 365 days a year to resolve system outages. All calls made to NCC are recorded in the Service Center Problem Management System. New Jersey Common Data Architecture New Jersey Common Information Architecture. A framework for consistent management of the State s information assets. As a domain of the larger Enterprise Architecture, it prescribes the architectural components, standards, practices and tools to be used in creating, delivering and managing information-based solutions for the State of New Jersey. Documentation can be found at: www.nj.gov/it/ps/it_architecture.pdf The operational hours during which the application must perform reliably and planned outages should not occur. Last revised: 1/15/2015 9:24 AM Page 5 of 8

Operational Restoration Point Objective Operational Restoration Time Objective Physical Data Model Physical Design Document Physical SAR Post Implementation Review Project Initiation, Planning and Execution Line (PIPE Line) Project Scope Project Sponsor The greatest acceptable time span since the last stable, available copy of the data to be restored at the production data center site can be utilized, after which, as a result of the component failure, data will have been lost permanently and cannot be recreated. The expected time to restore the IT Service at the production data center after an outage caused by component failure, not a data center failure. A Physical Data Model (PDM) represents the physical tables/files, fields/columns, and integrity and domain constraints derived from the business entities, attributes, and rules in the Logical Business Model. The model is represented in an Entity-Relationship Diagram (ERD), and the data elements should be expressed in a normalized (rational, non-redundant) form except to support the requirements of the application. A PDM is used to generate the DDL (Data Language), representing an out-of-context model, for a specific database system. Changes to the physical system should be made first by changing the PDM, which in turn should be coordinated with the Logical Business Model. Comprised of all the artifacts which contain information about the realized design of something. The third phase of the PIPE Line process, the Physical System Architecture Review is held during the Construction Phase. At this point, the technology and platforms have been decided, code has been deployed and initial testing has begun. The fifth phase of the PIPE Line process, this captures how the system performed during the first month after deployment. It can be used to determine if project deadlines and programming and infrastructure requirements have been met and to measure the successes/deficiencies of the system. The component within the Integrated Planning Process (IPP) that provides oversight, approval and reporting for all projects that require OIT resources. There are 5 separate PIPE Line meetings through the project lifecycle. These meetings are the Business Case Review, Logical Review, Physical Review, Implementation Review and Post Implementation Review. Defines the work that is required to deliver the project product or service to meet the project objectives. (HOW the project will be accomplished) The party or parties for which the application is being developed. The sponsor is usually responsible for financial expenses related to the application. Last revised: 1/15/2015 9:24 AM Page 6 of 8

Rules Engine SAR SCC Scope Discussions SI Vendor Single version of truth SITI Solutions Architect SSL Stakeholder Synthetic Transaction System Architecture Review Board Rules Engines or Inference Engines are the pluggable software components that separate the business rules from the application code. This allows the business users to modify the rules frequently without the need of IT intervention and hence allowing the applications to be more adaptable with the dynamic rules. A rule engine evaluates and executes rules, which are expressed as if-then statements. System Architecture Review. A three-stage process: Conceptual, Logical and Physical that are held during the lifecycle of system design System Command Center Meetings, discussions held to define the work required to meet the project objectives; how the project will be accomplished. System Integrator. Abbreviated as SI, an individual or company that specializes in building complete computer systems by putting together components from different vendors. Unlike software developers, systems integrators typically do not produce any original code. Instead they enable a company to use off-the-shelf hardware and software packages to meet the company's computing needs. In the logical design, each logical data element has a standard, agreed upon definition, and whenever possible, an identified authoritative source system of record. In the physical design, Universal Reference and Master Data is identified, published and used. Shared IT Infrastructure (FOR OIT, this would be the HUB, River Road and OARS). Subject matter experts that develop the logical and physical design. These would be the groups under the Enterprise Architects such as Network, Middleware, Storage, Operations, Data Management and Security. SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private. An individual with a vested interest in the success of the application development process. Real time action performed on monitored objects to measure the availability of service. Synthetic transactions serve no business value other than to exercise the system programming and infrastructure. The System Architecture Review Board consists of the Chief Enterprise Architect, the Chiefs of EADI (Enterprise Application Development and Integration), Architecture and Standards (A&S), The Chief of Information Security, and Infrastructure Support Services (ISS), and the four Enterprise Domain Architects for applications, business, infrastructure, and information. Individual solutions architects support the SAR Board members as necessary. Last revised: 1/15/2015 9:24 AM Page 7 of 8

Tactical Planning Document Telephony VAR or VAR Staff Vision Document A document that assures that a project is aligned with an agency s Strategic Plan. The Tactical Planning document will be reviewed to determine if a project needs to go through the Integrated Planning Process (IPP). Telephony is the technology associated with the electronic transmission of voice, fax, or other information between distant parties using systems historically associated with the telephone. Internet telephony is the use of the Internet rather than the traditional telephone company infrastructure and rate structure to exchange spoken or other telephone information. Short for value-added reseller, VARs typically load applications or proprietary software onto computers and may also incorporate thirdparty options to design a complete solution for a client. This "valueadded" system is often customized for a specific application, but is sold to the VAR's customer base under the original design manufacturer brand; with that manufacturer's warranty, support, and license agreements. This document is designed to make sure that key decision makers have a clear, shared vision of the objectives and scope of the project. It identifies alternatives and risks associated with the project. Finally, it presents a budget for the detailed planning phase for the stakeholders to approve. Last revised: 1/15/2015 9:24 AM Page 8 of 8