SlideShare uma empresa Scribd logo
1 de 4
Building an IT Applications inventory -
return on experience
Why inventory of IT applications is business critical?
IT applications contribute to the support of business processes or to the support other
applications, thanks to the execution of IT Software. Directly or indirectly, IT applications
have one main purpose; supporting the business in the most efficient way. They can be
considered as an enterprise’s asset.
Either custom developed, or packaged, IT applications represent a cost; licenses,
maintenance, customization, development, running fees etc…
In a large organization, due to reorganization, acquisitions or lack of coordination, it is hard
to keep track of which business processes are supported by which applications.
A trusted IT applications inventory united with process descriptions is the necessary
foundation to answer the following questions with fact-grounded confidence:
 What are the applications which support the most critical processes and which
require attention and investment?
 Are there applications which are barely or not used and for which recurring fees
occur?
 Is it possible to reduce costs by using one application instead of many applications
for the same business purpose?
 By virtue of the dependencies between applications, is business continuity at risk in
case of IT failure?
Informationquality is key
An outdated list of applications or many disparate sources of information about IT
applications cannot be used as a solid reference; no business decisions can be taken on their
basis. That’s why an inventory of applications needs to be maintained centrally.
Moreover, in order to allow the level of analysis required to answer business related
questions, it is necessary to link the applications to business processes representations; a
repository is required.
An applications repository reaches an optimal level of quality when all necessary
information is collected and signed-off.
There are two main type of information that need to be recorded:
Attributes
They store the properties of applications, like unique enterprise wide Identifier, Name,
Description, Responsibilities, Support responsibilities, assessment of Criticality which can be
in the form of a tiered classification, current Operational status, indication of update
strategy, number of users etc…
Relationships
Using a repository which integrates a database allows the documentation of relationships
between applications and other representations. Relations allow impact analysis queries
between Applications and the software products they use, the vendor providing them, the
main functionalities they support, and eventually the processes they support.
It is recommended to put in place a quality assurance mechanism that assesses the quality
of application documentation for completeness of required attributes (semantic quality) and
existence of relationships (syntactic quality). It should also include an assessment the
validity of the recorded information.
A pass score can be established to determine which applications descriptions are ready for
sign-off and promotion to the library.
Building the applications architecture is a process.
Building an applications inventory is a process that transforms a heterogeneous, redundant
and uncontrolled list of applications into a controlled catalogue placed under the
responsibility of the subject matters experts.
In order to reach the level of information quality required to allow trustworthy reference
and reporting it is necessary to ensure that each application is identified, documented and
signed off by the persons in charge of them within the enterprise.
Application inventory, constituted by the applications, their attributes and relations to other
objects, is structured content stored into a database. Yet, It is important to make sure that
initial unstructured, incomplete or approximate content may be taken into account as an
initial input.
A modelling tool that allows collaboration and sharing of application architecture views can
be used during discovery phases. Eventually, created application architecture views
constitute the graphical communication of the application inventory content stored into the
database.
Once signed-off an application is ready to be placed under architecture control. It is
promoted to a library. The library contains validated content and is presented strictly
according to conventions. The content of the library is the trusted reference.
Write access to the library is strictly controlled to prevent accidental or uncontrolled
modification of the applications library.
Last recommendations
Deliver services
It is important to stay focused on the business needs. When possible, adopt an agile
approach to allow rapid implementation and rapid adjustments to users and stake-holders
specific needs. Try to address immediate needs as much as possible, like the production of
reports to illustrate dependencies between applications supporting a specific process.
Facilitate learning
Allow a smooth and progressive adoption of the application inventory building process (it’s
a group learning exercise). Keep it easy; develop simple conventions, create a project space
where creativity is allowed and mistakes have no consequences, when collecting input from
subject matter experts, privilege focus on content instead of focus on layout or
presentation. When possible make the most of available collaborative software that allows
easy screen sharing and collaboration across the enterprise.
Enforce reference material
Applications inventory has to become referential, communicated, understood and used
across the enterprise. It can then be used with confidence for business analysis, planning,
design of future solutions.
To allow comparison and optimisation, when possible, describe applications with mapping
relations to readily available enterprise wide reference material like a common Application
domains model.
Unite with business processes
Applications support Business processes: It’s a good way to track applications’ fitness for
business purpose.
Frederick Halas is a SeniorConsultantatLeonardoConsulting(www.leonardo.com.au).Frederick
joinedLeonardoconsultingaftermore than15 years’experience insoftware development,related
methodologiesandenterprisearchitecturecapabilitydevelopment. He can be contactedat
f.halas@leonardo.com.au.

Mais conteúdo relacionado

Destaque (8)

O que pesquisar em erva-mate?
O que pesquisar em erva-mate?O que pesquisar em erva-mate?
O que pesquisar em erva-mate?
 
Tm forum application_framework_tam_12.5
Tm forum application_framework_tam_12.5Tm forum application_framework_tam_12.5
Tm forum application_framework_tam_12.5
 
Presentacion de la enfermedad del Sarampion
Presentacion de la enfermedad del SarampionPresentacion de la enfermedad del Sarampion
Presentacion de la enfermedad del Sarampion
 
Dendistry intro and brain
Dendistry intro and brainDendistry intro and brain
Dendistry intro and brain
 
Dendistry best main lesson
Dendistry best main lessonDendistry best main lesson
Dendistry best main lesson
 
Nietzsche
NietzscheNietzsche
Nietzsche
 
Dossier sur le géomarketing
Dossier sur le géomarketingDossier sur le géomarketing
Dossier sur le géomarketing
 
Proceso selección de personal ppt act 2
Proceso selección de personal ppt act 2Proceso selección de personal ppt act 2
Proceso selección de personal ppt act 2
 

Mais de Frederick Halas

Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?
Frederick Halas
 
Architecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_PlanningArchitecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_Planning
Frederick Halas
 
ArchitectureBaselineDesign
ArchitectureBaselineDesignArchitectureBaselineDesign
ArchitectureBaselineDesign
Frederick Halas
 

Mais de Frederick Halas (6)

Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?
 
On the nature of the enterprise architecture capability
On the nature of the enterprise architecture capabilityOn the nature of the enterprise architecture capability
On the nature of the enterprise architecture capability
 
Capabiliy analysis helping Ice Age Business transformation
Capabiliy analysis helping Ice Age Business transformationCapabiliy analysis helping Ice Age Business transformation
Capabiliy analysis helping Ice Age Business transformation
 
ITStrategicPlan
ITStrategicPlanITStrategicPlan
ITStrategicPlan
 
Architecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_PlanningArchitecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_Planning
 
ArchitectureBaselineDesign
ArchitectureBaselineDesignArchitectureBaselineDesign
ArchitectureBaselineDesign
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

IT inventorying is a business process

  • 1. Building an IT Applications inventory - return on experience Why inventory of IT applications is business critical? IT applications contribute to the support of business processes or to the support other applications, thanks to the execution of IT Software. Directly or indirectly, IT applications have one main purpose; supporting the business in the most efficient way. They can be considered as an enterprise’s asset. Either custom developed, or packaged, IT applications represent a cost; licenses, maintenance, customization, development, running fees etc… In a large organization, due to reorganization, acquisitions or lack of coordination, it is hard to keep track of which business processes are supported by which applications. A trusted IT applications inventory united with process descriptions is the necessary foundation to answer the following questions with fact-grounded confidence:  What are the applications which support the most critical processes and which require attention and investment?  Are there applications which are barely or not used and for which recurring fees occur?  Is it possible to reduce costs by using one application instead of many applications for the same business purpose?  By virtue of the dependencies between applications, is business continuity at risk in case of IT failure?
  • 2. Informationquality is key An outdated list of applications or many disparate sources of information about IT applications cannot be used as a solid reference; no business decisions can be taken on their basis. That’s why an inventory of applications needs to be maintained centrally. Moreover, in order to allow the level of analysis required to answer business related questions, it is necessary to link the applications to business processes representations; a repository is required. An applications repository reaches an optimal level of quality when all necessary information is collected and signed-off. There are two main type of information that need to be recorded: Attributes They store the properties of applications, like unique enterprise wide Identifier, Name, Description, Responsibilities, Support responsibilities, assessment of Criticality which can be in the form of a tiered classification, current Operational status, indication of update strategy, number of users etc… Relationships Using a repository which integrates a database allows the documentation of relationships between applications and other representations. Relations allow impact analysis queries between Applications and the software products they use, the vendor providing them, the main functionalities they support, and eventually the processes they support. It is recommended to put in place a quality assurance mechanism that assesses the quality of application documentation for completeness of required attributes (semantic quality) and existence of relationships (syntactic quality). It should also include an assessment the validity of the recorded information. A pass score can be established to determine which applications descriptions are ready for sign-off and promotion to the library.
  • 3. Building the applications architecture is a process. Building an applications inventory is a process that transforms a heterogeneous, redundant and uncontrolled list of applications into a controlled catalogue placed under the responsibility of the subject matters experts. In order to reach the level of information quality required to allow trustworthy reference and reporting it is necessary to ensure that each application is identified, documented and signed off by the persons in charge of them within the enterprise. Application inventory, constituted by the applications, their attributes and relations to other objects, is structured content stored into a database. Yet, It is important to make sure that initial unstructured, incomplete or approximate content may be taken into account as an initial input. A modelling tool that allows collaboration and sharing of application architecture views can be used during discovery phases. Eventually, created application architecture views constitute the graphical communication of the application inventory content stored into the database. Once signed-off an application is ready to be placed under architecture control. It is promoted to a library. The library contains validated content and is presented strictly according to conventions. The content of the library is the trusted reference. Write access to the library is strictly controlled to prevent accidental or uncontrolled modification of the applications library.
  • 4. Last recommendations Deliver services It is important to stay focused on the business needs. When possible, adopt an agile approach to allow rapid implementation and rapid adjustments to users and stake-holders specific needs. Try to address immediate needs as much as possible, like the production of reports to illustrate dependencies between applications supporting a specific process. Facilitate learning Allow a smooth and progressive adoption of the application inventory building process (it’s a group learning exercise). Keep it easy; develop simple conventions, create a project space where creativity is allowed and mistakes have no consequences, when collecting input from subject matter experts, privilege focus on content instead of focus on layout or presentation. When possible make the most of available collaborative software that allows easy screen sharing and collaboration across the enterprise. Enforce reference material Applications inventory has to become referential, communicated, understood and used across the enterprise. It can then be used with confidence for business analysis, planning, design of future solutions. To allow comparison and optimisation, when possible, describe applications with mapping relations to readily available enterprise wide reference material like a common Application domains model. Unite with business processes Applications support Business processes: It’s a good way to track applications’ fitness for business purpose. Frederick Halas is a SeniorConsultantatLeonardoConsulting(www.leonardo.com.au).Frederick joinedLeonardoconsultingaftermore than15 years’experience insoftware development,related methodologiesandenterprisearchitecturecapabilitydevelopment. He can be contactedat f.halas@leonardo.com.au.