SlideShare uma empresa Scribd logo
1 de 36
Course Name: Enterprise Architecture Framework and Information Systems Planning Essentials

                                          Day 1:
                     MORNING                                      AFTERNOON
08:00-08:30                                   01:00-03:00
Registration                                  Enterprise Architecture:
                                              TOGAF FRAMEWORK
08:30-09:00                                   03:00-03:30
Course Orientation                            Coffee Break
09:00-10:00                                   03:30-5:00
Enterprise Architecture:                      Enterprise Architecture:
DEFINITIONS AND STANDARDS                     NASCIO TOOLKIT
10:00-10:30                                   05:00
Coffee Break                                  Home
10:30-12:00
Enterprise Architecture:
COMPETENCY AND MATURITY
12:00
Lunch Break
                                           DAY 2
                     MORNING                                      AFTERNOON
08:00-08:30                                   01:00-03:00
Lessons Learned                               Enterprise Architecture:
                                              BUSINESS ANALYSIS FRAMEWORK
08:30-10:00                                   03:00-03:30
Enterprise Architecture:                      Coffee Break
ZACHMAN INTERROGATIVES
10:00-10:30                                   03:30-05:00
Coffee Break                                  Enterprise Architecture:
                                              PERFORMANCE MODEL & PROCESS MAPPING
10:30-12:00
Enterprise Architecture:
ARCHITECTURE COMPONENTS ELABORATION
12:00-01:00
Lunch Break
                                           DAY 3
                     MORNING                                      AFTERNOON
08:00-08:30                                   01:00-03:00
Lessons Learned                               Enterprise Architecture:
                                              TECHNOLOGY REFERENCE MODEL
08:30-10:00                                   03:00-03:30
Enterprise Architecture:                      Coffee Break
INFORMATION MATURITY MODEL
10:00-10:30                                   03:30-05:00
Coffee Break                                  Enterprise Architecture:
                                              INFORMATION SYSTEM SECURITY MATURITY MODEL
10:30-12:00
Enterprise Architecture:
DATA AND APPLICATION CONCEPTUAL MODEL
12:00-01:00
Lunch Break
Day 4:
                    MORNING                                     AFTERNOON
08:00-08:30                                  01:00-03:00
Lessons Learned                              Information Systems Strategic Planning:
                                             STRATEGIC PLAN INPUT AND THINKING TOOLS
08:30-10:00                                  03:00-03:30
Information Systems Strategic Planning:      Coffee Break
MODELS OF STRATEGIC PLANNING
10:00-10:30                                  03:30-05:00
Coffee Break                                 Information Systems Strategic Planning:
                                             STRATEGIC PLAN AUTHORING TEMPLATE
10:30-12:00                                  05:00
Information Systems Strategic Planning:      Home
STRATEGIC PLAN INTERROGATIVES AND WORKPLAN
12:00
Lunch Break
                                          Day 5:
                    MORNING                                     AFTERNOON
08:00-08:30                                  01:00-03:00
Lessons Learned                              Open Standard Software and Templates:
                                             ENTERPRISE ARCHITECTURE BUSINESS CASE AND
                                             TERMS OF REFERENCE
08:30-10:00                                  03:00-03:30
Open Standard Software and Templates:        Coffee Break
DOCUMENTATION SOFTWARE
10:00-10:30                                  03:30-05:00
Coffee Break                                 Open Standard Software and Template
                                             ENTERPRISE ARCHITECTURE AND STRATEGIC
                                             PLANNING PROJECT PLAN
10:30-12:00                                  05:00
Open Standard Software and Templates:        Home
PROCESS AND DATA MODELER SOFTWARE
12:00
Lunch Break
Training Notes

Introduction:

Enterprise architectures provides the “living documents” called reference models to make the
organization to effectively and efficiently managed recordings, expectations, processes,
configurations, metrics, work arounds, changes, relationships, collaborations, interchanges,
requirement tracing, control, and marketing of the business operation. It provides a “single-
reference-of-truth” to properly lead the business process improvement and the optimal value-
added integration of technology in the business operation of the organization.

The enterprise architecture tools provide the principles, methods, vocabulary, conventions,
presentation objects, procedures, software, repositories, and artifacts in order to draw the
reference models of the enterprise that speaks of its business, information, technology, and
people.

The drawn models are kept in digital repository and made accessible anytime when business
strategic planning, enterprise performance evaluation, and program and ICT project
development are initiated by the organization. It is reconfigured when new understanding about
the business, information, technology, and people are brought in by the improved enterprise
strategy, new program and projects, and enterprise metrics.

The “Doing the Enterprise Architecture” process requires the collaborative engagement between
the “minds and practitioners” running the business processes and those delivering the
technology services. It is to properly compose the reference models of the organization that will
make the business functional units and ICT service providers to realize the performance
objectives through information and communication technology.

ENTERPRISE ARCHITECTURE PRACTICE IN THE AGENCY: CHECK LIST

Does your agency maintains a blueprint or matrix of all running systems, showing how   YES   NO   NOT
they interoperate, and which technology they are using?                                           SURE

Can your agency readily presents the professional and business user matrix with with   YES   NO   NOT
their requirements, and the technology services that address those requirements?                  SURE


Does your agency have a documented map of enterprise-wide data, how data is being      YES   NO   NOT
grouped, how data are related, how data is being accessed, how data is shared, and                SURE
how data is secured?

Are there silos of data and application in the different units of the agency?          YES   NO   NOT
                                                                                                  SURE
When your agency start a project do you have an enterprise architecture blueprint,     YES   NO   NOT
which you have to align the type of application to be designed and developed?                     SURE


Is there a formal stage in the project life cycle where system architecture is being   YES   NO   NOT
checked against the enterprise architecture?                                                      SURE


If you have any question or problem regarding architecture do you know who to seek     YES   NO   NOT
for guidance, decision and documentation?                                                         SURE


Is there an official guidance and listing of all business standards, methods and and   YES   NO   NOT
tools, technical references that both IT and Business have to use, or you can use                 SURE
whatever technology you want?
Part 01: DEFINITIONS AND STANDARDS


Enterprise Architecture Description (from various references)
FEA definition:
     "The FEA (Federal Enterprise Architecture) consists of a set of interrelated "reference
     models" designed to facilitate cross-agency analysis and the identification of duplicative
     investments, gaps and opportunities for collaboration within and across agencies.
     Collectively, the reference models comprise a framework for describing important elements
     of the FEA in a common and consistent way. Through the use of this common framework and
     vocabulary, IT portfolios can be better managed and leveraged across the federal
     government."

CIO Definitions from SearchCIO.com, posted October, 2006:

      "An enterprise architecture (EA) is a conceptual blueprint that defines the structure and
      operation of an organization. The intent of an enterprise architecture is to determine how
      an organization can most effectively achieve its current and future objectives. Purported
      advantages of having an enterprise architecture include improved decision making, improved
      adaptability to changing demands or market conditions, elimination of inefficient and
      redundant processes, optimization of the use of organizational assets, and minimization of
      employee turnover."

NASCIO Enterprise Architecture Development Toolkit v.3.0

       “Enterprise architecture defines an enterprise-wide, integrated set of components that
       incorporates strategic business thinking, information assets, and the technical infrastructure of
       an enterprise to promote information sharing across agency and organizational boundaries. The
       Enterprise Architecture is supported by Architecture Governance and the allied architectures of,
       Business, Information, Technology and Solution Architectures.”

       "enterprise" as any collection of organizations that has a common set of goals. For example, an
       enterprise could be a government agency, a whole corporation, a division of a corporation, a
       single department, or a chain of geographically distant organizations linked together by common
       ownership.


TOGAF version 9.0
       The term "enterprise" in the context of "enterprise architecture" can be used to denote both an
       entire enterprise - encompassing all of its information and technology services, processes, and
       infrastructure - and a specific domain within the enterprise. In both cases, the architecture
       crosses multiple systems, and multiple functional groups within the enterprise.

CLINGER-COHEN

       Enterprise Architecture (EA) links the business mission, strategy, and processes of an organization
       to its IT strategy. It is documented using multiple architectural models or views that show how
       the current and future needs of an organization will be met. By focusing on strategic
       differentiators and working across the enterprise, there is a unique opportunity to create
       leverage and synergies and avoid duplication and inconsistencies across the enterprise. The key
       components of the EA are:
           • Accurate representation of the business environment, strategy and critical success factors
           • Comprehensive documentation of business units and key processes
           • Views of the systems and data that support these processes
           • A set of technology standards that define what technologies and products are approved to
                be used within an organization, complemented by prescriptive enterprise-wide guidelines
                on how to best apply these technology standards in creating business applications.
Terminology                                      Definition                               Source
Architecture                         The specification that identifies components and their         Software
                                     associated functionalities. It describes connectivity of       Engineering
                                     components and the mapping of of functionality into            Institute
                                     components. Architectures can be of different types and
                                     cover hardware, software, systems, and can be domain
                                     specific to describes business, data, application, technology,
                                     network, security, etc..
Architecture View                    It is a representation of the set of system elements and the   IEEE
                                     relation associated with them. It represents a whole system
                                     from the perspective of related sets of concerns. Views are
                                     representations of the many system structures that are
                                     present simultaneously in software system.
Architecture Framework               The combination of structured processes, templates, and      NASCIO
                                     governance that facilitate the elicitation and documentation
                                     of the architecture in a systematic manner.
Architecture Domain                  High level gouping of disciplines, functional or topical       OMB, NASCIO
                                     operations that form the main building block of the
                                     architectural framework. It talks of sphere of activity,
                                     interest, or functions.
Architecture Component               Level of details contain in specific architectural domain      NASCIO

Enterprise                           An organization supporting a defined business scope and        MITRE EABOOK
                                     mission. An enterprise is comprised of interdependent
                                     resources (people, organizations, and technology) who must
                                     coordinate their functions and share information in support
                                     of a common mission
Enterprise                           Any collection of organizations that has a common set of       TOGAF
                                     goals.
Enterprise Architecture Artifacts Artifacts constitute any object, or work product that is          NASCIO
                                     developed as a component of the enterprise architecture.
                                     Artifacts includes trends, principles, mission, goals,
                                     objectives, strategies, capabilities, processes, processes
                                     steps, entities, attributes, relationship, subject areas,
                                     application components, application, database, network
                                     infrastructure, and configuration details.
Business Architecture                The high level representation of the business strategies,      NASCIO
                                     intentions, functions, processess, information, and assets
                                     critical to operating the business of government successfully.
Business Reference Model             It is a function driven framework that describes the business OMB
                                     operation independent of the organization performing the
                                     job. It provides an organized and hierarchical construct for
                                     describing the day-to-day business operation.
Data Reference Model                 It describes the data and information that supports the        CIOGOV
                                     government agency operation from an agency and
                                     government-wide perspective.
Performance Reference Model          It is the standardized framework to measure the                OCIO-DOI
                                     performance of major IT investments and their contribution
                                     to program performance.
Technology Reference Model           It is a component-driven, technical framework used to          OCIO-DOI
                                     categorize the standards, specifications, and technologies
                                     that support and enable the delivery of service components
                                     and capabilities
ENTERPRISE ARCHITECTURE CONTEXT IN GOVERNMENT MODEL

Aligning the information and communications techonology services to the directives, business, information
and technology architecture of the government agency.
Part 02: COMPETENCY AND MATURITY
Importance of Enterprise Architecture
Schekkerman, J. (2005). Trends in Enterprise Architecture, Institute for Enterprise Architecture
Development, white paper.

          VALUE INDICATORS                                          DESCRIPTIONS

Alignment                              Enterprise architecture provides the framework to enable better
                                       alignment of business and information technology objectives. The
                                       architecture used can also serve as a communication tool.
Integration                            Enterprise architecture establishes the infrastructure that enables
                                       business rules to be consistently applied across the organization,
                                       documents data flows, uses and interfaces.
Value Creation                         Enterprise architecture provides better measurement of information
                                       technology economic value in an environment where there is a higher
                                       potential for reusable hardware and software assets
Change Management                      Enterprise architecture establishes consistent infrastructure and
                                       formalizing the management of the infrastructure and information
                                       assets better enables an organization-wide change management
                                       process to be established to handle information technology changes
Compliance                             Enterprise architecture provides the artifacts necessary to ensure
                                       legal and regulatory compliance for the technical infrastructure and
                                       environment.


Maturity Levels of Enterprise Architecture Program
(NASCIO)

 Maturity Level       Status Name                                     Description
LEVEL O           No Program             There is not a documented architectural framework in place at this level
                                         of maturity. While solutions are developed and implemented, this is
                                         done with no recognized standards or base practices. The organization is
                                         completely reliant on the knowledge of independent contributors.
LEVEL 1           Informal Program       The base architecture framework and standards have been defined and
                                         are typically performed informally. There is general consensus that
                                         these steps should be performed, however they may not be tracked and
                                         followed. Organizations with an Enterprise Architecture framework at
                                         this level are still dependant on the knowledge of individual
                                         contributors.
LEVEL 2           Repeatable Program The base architecture and standards have been identified and are being
                                         tracked and verified. At this point in the program processes are
                                         repeatable and reusable templates are starting to be developed. The
                                         need for product and compliance components to conform to the
                                         standards and requirements has been agreed upon, and metrics are
                                         used to track process area performance.
LEVEL 3           Well Defined           The enterprise architecture framework is well defined; using approved
                  Program                standard and/or customized versions of the templates. Processes are
                                         documented across the organization.
                                         Performance metrics are being tracked and monitored in relationship to
                                         other general practices and process areas.
LEVEL 4           Managed Program        At this point performance metrics are collected, analyzed and acted
                                         upon. The metrics are used to predict performance and provide better
                                         understanding of the processes and capabilities.
LEVEL 5           Continously            The processes are mature; targets have been set for effectiveness and
                  Improved Vital         efficiency based on business and technical goals. There are ongoing
                  Program                refinements and improvements based on the understanding of the
                                         impact changes have to these processes.
The Enteprise Architect Responsibilities
(TOGAF)

        TASKS                                                  DESCRIPTIONS
Understand and           Probe for information, listen to information, influence people, facilitate consensus
interpret                building, synthesize and translate ideas into actionable requirements, articulate those
requirements             ideas to others. Identify use or purpose, constraints, risks, etc.

                         The architect participates in the discovery and documentation of the customer's business
                         scenarios that are driving the solution. The architect is responsible for requirements
                         understanding and embodies that requirements understanding in the architecture
                         specification.
Create a useful          Take the requirements and develop well-formulated models of the components of the
model                    solution, augmenting the models as necessary to fit all of the circumstances. Show
                         multiple views through models to communicate the ideas effectively.

                         The architect is responsible for the overall architecture integrity and maintaining the
                         vision of the offering from an architectural perspective. The architect also ensures
                         leverage opportunities are identified, using building blocks, and is a liaison between the
                         functional groups (especially development and marketing) to ensure that the leverage
                         opportunities are realized.

                         The architect provides and maintains these models as a framework for understanding the
                         domain(s) of development work, guiding what should be done within the organization, or
                         outside the organization. The architect must represent the organization view of the
                         architecture by understanding all the necessary business components
Validate, refine, and Verify assumptions, bring in subject matter experts, etc. in order to improve the model
expand the model      and to further define it, adding as necessary new ideas to make the result more flexible
                         and more tightly linked to current and expected requirements.

                         The architect additionally should assess the value of solution-enhancing developments
                         emanating from field work and incorporate these into the architecture models as
                         appropriate.
Manage the               Continuously monitor the models and update them as necessary to show changes,
architecture             additions, and alterations. Represent architecture and issues during development and
                         decision points of the program.
                         The architect is an "agent of change", representing that need for the implementation of
                         the architecture. Through this development cycle, the architect continuously fosters the
                         sharing of customer, architecture, and technical information between organizations


CLINGER-COHEN ENTERPRISE ARCHITECT SUMMARY OF COMPETENCIES

   •   A basic grounding in the agency’s environment, strategy and priorities
   •   Extensive knowledge of IT capabilities, covering current and emerging technologies
   •   Good knowledge of how similar agencies use or plan to use technology
   •   Ability to rationalize technology opportunities and business drivers optimizing return on
       investment
   •   Familiar with agency’s architectural principles and policies, able to interpret and apply
   •   “Hands on” experience in architecture, able to perform a number of architectural tasks
   •   Must have a mixture of BPR, business processes, and meeting facility
   •   Strong in capability modeling
   •   Can define and understand component capabilities and apply solutions
   •   Ability to look at technology trends and effectively apply to business/project needs
   •   Ability to look at and define target architecture for speciality projects
   •   Ability to manage a repository - repository modeling and analysis
   •   Competency in several tool sets
   •   Ability to manage a project portal to identify concepts, work in progress, etc.
   •   Able to identify redundancies among existing and proposed IT efforts
   •   Ability to bring together an overall Enterprise Architecture from several individual EA efforts
   •   Ability to develop the crux functional integration services that can be implemented in patterns
Part 03: ENTEPRISE ARCHITECTURE FRAMEWORK: TOGAF

Guidance Componets
01. Architecture Development Method Cycle        Introduction to the ADM
                                                 Preliminary Phase
                                                 Phase A: Architecture Vision
                                                 Phase B: Business Architecture
                                                 Phase C: Information Systems Architectures
                                                 Phase C: Information Systems Architectures - Data
                                                 Architecture
                                                 Phase C: Information Systems Architectures -
                                                 Applications Architecture
                                                 Phase D: Technology Architecture
                                                 Phase E: Opportunities and Solutions
                                                 Phase F: Migration Planning
                                                 Phase G: Implementation Governance
                                                 Phase H: Architecture Change Management
                                                 ADM Architecture Requirements Management

02. Architecture Development Method Guidelines Applying Iteration to the ADM
and Techniques                                 Applying the ADM at different Enterprise Levels
                                               Security Architecture and the ADM
                                               Using TOGAF to define and Govern SOAs
                                               Architecture Principles
                                               Architecture Stakeholder Management
                                               Architecture Patterns
                                               Business Scenarios
                                               Gap Analysis
                                               Migration Planning Techniques
                                               Interoperability Requirements
                                               Business Transformation Readiness Assessment
                                               Risk Management
                                               Capability-Based Planning

03. Architecture Content Framework               Introduction to the Architecture Content
                                                 Framework
                                                 Content Metamodel
                                                 Architectural Artifacts
                                                 Architectural Deliverables
                                                 Building Blocks

04. Enterprise Continoum Tools                   Introduction
                                                 Enterprise Continuum
                                                 Architecture Partitioning
                                                 Architecture Repository
                                                 Tools for Architecture Development

05. Reference Model                              Foundation Architecture: TRM
                                                 III-RM

06. Architecture Capability                      Introduction
                                                 Establishing an Architecture Capability
                                                 Architecture Board
                                                 Architecture Compliance
                                                 Architecture Contracts
                                                 Architecture Governance
                                                 Architecture Maturity Models
                                                 Architecture Skills Framework
Part 04: ENTERPRISE ARCHITECTURE FRAMEWORK: NASCIO DEVELOPMENT TOOLKIT
      TOOLKIT COMPONENTS                                        DESCRIPTION
Architecture Governance              The processes necessary to direct or guide initiatives, to ensure
                                     that performance aligns with the enterprise, to enable the
                                     enterprise business by exploiting opportunities, and to ensure
                                     resources are used responsibly and architecture-related risks are
                                     managed appropriately.
Business Architecture                An architecture within EA that provides the high-level
                                     representation of the business strategies, intentions, functions,
                                     processes, information and assets critical
                                     to providing services to citizens, businesses, governments and the
                                     like.

                                     Business architecture should include an environmental context,
                                     market or need assessment, strategic business intent, traceability
                                     to capabilities and the management initiatives that will deliver or
                                     further leverage those enabling capabilities. Business
                                     architecture is defined by some as constituting the top two rows
                                     of the Zachman Framework.
Information Architecture             The compilation of the business requirements of the enterprise,
                                     the information process entities and integration that drive the
                                     business and rules for selecting, building and maintaining that
                                     information. This includes data and process architecture.
Solution Architecture                An architecture within EA that guides the solution architect in the
                                     design of a particulate solution set. For each solution set,
                                     Solution Architecture assists in:

                                         •   The identification of business requirements,
                                         •   ƒThe determination of the design specifications necessary
                                             to deliver the business requirements,
                                         •   The development of the solution set design. Integrating
                                             designs based on details with the Business, Information
                                             and Technology blueprints.
Technical Architecture               A disciplined approach to describing the current and future
                                     structure and inter-relationships of the enterprise’s technologies
                                     in order to maximize value in those technologies. It examines the
                                     technologies that are required to run the enterprise and develops
                                     a unified vision of the enterprise’s infrastructure and technology
                                     platforms.
Enterprise Architecture Facilitation A guide on building the enterprise architecture team, and the
Guide                                tasks to be performed in implementing an enteprise architecture
                                     program for the government enterprise.
Part 05: ZACHMAN ARCHITECTURE INTERROGATIVES
The focus of an enterprise architects is to elaborate, analyze, and build the relationships among
technology, information and business viewpoints in the acquisition and development of solutions … It
makes sure that the organization can flexibly integrate with changes demanded by market positioning,
innovation, etc. John Zachman provides the detailed components to describe the enteprise
architecture.

PERSPECTIVES         WHAT                HOW                WHERE              WHO               WHEN                WHY
OBJECTIVES/      List of things    List of processes   List of location   List of           List of business   List of business
SCOPES           important to      the enterprise      the enterprise     organizational    events or cycles   goals and
                 the enterprise    performs            operates           units                                stategies
BUSINESS MODEL   Entity            Business Process    Logistic Network Organizational     Business Master     Business Plan
                 Relationship      Model (physical     (Nodes and Links) Charts with Roles Schedule
                 Diagram           data flow                             and Skills Sets
                                   diagram)
INFORMATION      Data Model        Application         Distributed        Human Interfaces Dependency          Business rule
SYSTEM MODEL     Data Dictionary   Model and Data      System             Model (role, data Diagram, Entity    model
                                   Flow Diagram        Architecture       , access)         Life History
TECHNOLOGY       Data              Systems Design      Systems            User Interface,   Control Structure Business rule
MODEL            Architecture      Structure Chart,    Architecture       Usability,        -Control Flow     design
                 (Elements,        Pseudo Code         (Hardware,         Security Design   Diagram
                 relational                            Software,
                 tables)                               Network)
DETAILED         Data Design,     Detailed Program Network                User Screen and   Timing Defintion   Program Logic
REPRESENTATION   Physical Storage Design           Architecture           Security                             Rules
                 Design                                                   Architecture                         Specifications
FUNCTIONING      Converted Data    Executable          Communication      Trained People    Business Events    Enforced Rules
SYSTEM                             Program             Facilities
Part 06: ARCHITECTURE COMPONENT ELABORATION

BUSINESS ARCHITECTURE       Understanding how the business is       Identify Business Model  Business
                            running, what are its needs, what is    Functions and WHO Performs the
                            missing and what needs to be            Function.
                            changed or improved.
                                                                    Definition of Business Goals and
                            It defines the business strategy,       Goals, the supporting processes,
                            governance, organization, and key       workflow, policies and
                            business processes of the               procedures.
                            organization.
                                                                    Assessment of the Current State
                                                                    and Description of the Future
                                                                    State.

                                                                    How are the goals and objectives
                                                                    implemented through the ICT
                                                                    Solutions and the supporting
                                                                    technical infrastructure.

DATA ARCHITECTURE           It defines how data is stored,          Data Element
                            managed, and used in a system. It       Data Flow Diagram
                            establishes common guidelines for       Entity Relationship
                            data operations that make it possible   Relational Structure
                            to predict, model, and control the      Data Physical Storage
                            flow of data in the system.             Data Interoperatibility
                                                                    Data Standard
                            It describes the structure of an        Supported Informational Themes
                            organization's logical and physical
                            data assets and the associated data
                            management resources



APPLICATION ARCHITECTURE    Application architecture consists of    Current inventory of applications
                            logical systems that manage the data    and components.
                            objects in the data architecture and
                            support the business functions in the   Evolving applications and
                            Business Architecture.                  components needed to fulfill for
                                                                    the business units.
                            It provides a blueprint for the         Migration plans for moving the
                            individual application systems to be    EXISTING portfolio toward the
                            deployed, the interactions between      PLANNED portfolio
                            the application systems, and their
                            relationships to the core business
                            processes of the organization

TECHNOLOGY ARCHITECTURE It describes current and future             Hardware Platform
                        technical infrastructure and specific       Operating System
                        hardware and software technologies          Application System
                        that support the Agency information         Database System
                        systems. It provides guidance and           Network & Communication System
                        principles for implementing                 Security System
                        technologies within the application         Enterprise Systems Management
                        architecture.                               Development Methods
                                                                    Technical Standards
                            It describes the hardware, software     Interoperatability References
                            and network infrastructure needed
                            to support the deployment of core,
                            mission-critical applications.
NASCIO ENTERPRISE ARCHITECTURE DEVELOPMENT TOOLKIT – EA DOMAINS

BUSINESS REFERENCE      It provides an organized, hierarchical construct for describing the day-to-day
MODEL                   business operations of the Federal government. While many models exist for
                        describing organizations - org charts, location maps, etc. - this model
                        presents the business using a functionally driven approach.

                        The Lines of Business and Sub-functions that comprise the BRM represent a
                        departure from previous models of the Federal government that use
                        antiquated, stovepiped, agency-oriented frameworks. The BRM is the first
                        layer of the Federal Enterprise Architecture and it is the main viewpoint for
                        the analysis of data, service components and technology.
DATA REFERENCE MODEL    It describes, at an aggregate level, the data and information supporting
                        government program and business line operations. This model enables
                        agencies to describe the types of interaction and exchanges occurring
                        between the Federal government and citizens.

                        The DRM categorizes government information into greater levels of detail. It
                        also establishes a classification for Federal data and identifies duplicative
                        data resources. A common data model will streamline information exchange
                        processes within the Federal government and between government and
                        external stakeholders.

                        "Data dictionary" will enable the development of common data identification
                        "tags" that will facilitate information exchange both within the Federal
                        government between the government and its external stakeholders
                        The DRM provides a standard means by which data may be described,
                        categorized, and shared. These are reflected within each of the DRM’s three
                        standardization areas:
                             • Data Description: Provides a means to uniformly describe data,
                                 thereby supporting its discovery and sharing
                             • Data Context: Facilitates discovery of data through an approach to
                                 the categorization of data according to taxonomies; additionally,
                                 enables the definition of authoritative data assets within a
                                 community of interest (COI)
                             • Data Sharing: Supports the access and exchange of data where
                                 access consists of ad-hoc requests (such as a query of a data asset),
                                 and exchange consists of fixed, re-occurring transactions between
                                 parties
SERVICE REFERENCE       It is a business and performance-driven, functional framework that classifies
MODEL                   Service Components with respect to how they support business and/or
                        performance objectives.

                        The SRM is intended for use to support the discovery of government-wide
                        business and application Service Components in IT investments and assets.
                        The SRM is structured across horizontal and vertical service domains that,
                        independent of the business functions, can provide a leverage-able
                        foundation to support the reuse of applications, application capabilities,
                        components, and business services.
TECHNICAL REFERENCE     The Technical Reference Model (TRM) provides a foundation to categorize
MODEL                   the standards, specifications, and technologies to support the construction,
                        delivery, and exchange of business and application components (Service
                        Components) that may be used and leveraged in a Component-Based or
                        Service-Oriented Architecture.
                        The TRM unifies existing Agency TRMs and E-Gov guidance by providing a
                        foundation to advance the re-use of technology and component services
                        from a government-wide perspective.
Part 07: BUSINESS ANALYSIS FRAMEWORK
Business Analysis Body of Knowledge
International Institute of Business Analysis

Business analysis is the set of tasks and techniques used to work as a liaison among stakeholders in order
to understand the structure, policies, and operations of an organization, and recommend solutions that
enable the organization to achieve its goals.

                 COMPONENTS                                             DESCRIPTION
Business Analysis Planning and Monitoring         It describes how to determine which activities are
                                                  necessary to perform in order to complete a business
                                                  analysis effort. It covers identifcation of stakeholders,
                                                  selection of business analysis techniques, the process
                                                  we will use to manage our requirements, and how we
                                                  assess the progress of the work in order to make
                                                  necessary changes in work effort.
Enterprise Analysis                               It describes how we take a business need, refne and
                                                  clarify the defnition of that need, and defne a solution
                                                  scope that can feasibly be implemented
                                                  by the business. It covers problem defnition and analysis
                                                  business case development, feasibility studies, and the
                                                  defnition of a solution scope.
Elicitation                                       It describes how we work with stakeholders to fnd out
                                                  what their needs are and ensure that we have correctly
                                                  and completely understood their needs.
Requirements Analysis                             It describes how we progressively elaborate the solution
                                                  defnition in order to enable the project team to design
                                                  and build a solution that will meet the needs of the
                                                  business and stakeholders.
Solution Assessment and Validation                Solution Assessment and Validation describes how to
                                                  assess proposed solutions to determine which solution
                                                  best fts the business need, identify gaps and
                                                  shortcomings in solutions, and determine necessary
                                                  workarounds or changes to the solution
Requirements Management and                       It describes how we manage conficts, issues and
Communication                                     changes and ensure that stakeholders and the project
                                                  team remain in agreement on the solution scope
Part 08: PROCESS MAPPING AND PERFORMANCE MODEL


Business and Process Entity Requirements Definition
BUSINESS DEFINITION MATRIX

   MANDATE      STAKEHOLDERS        FUNCTIONS              BUSINESS        PRODUCTS          CONTROLS
                                                            ENTITY
                                  Core Functions




                                  Special Functions




 BUSINESS ENTITY         BUSINESS            PERFORMANCE           PROCESS NAME           RELATIONSHIPS
                        LOCATIONS             OBJECTIVES




INFORMATION REQUIREMENT MAPPING
  BUSINESS    PROCESS    INFORMATION   INFORMATION     PROCEDURE      RULES &    INFORMATION   INFORMATION
   ENTITY      NAME         SOURCE       CAPTURE                      POLICIES    REPORTING      CUSTOMER
                                          FORM                                      FORM




PROCESS NAME:                                                BUSINESS ENTITY:
   SOURCE       INPUT           ENTRY              TASKS         EXIT            OUTPUT        CUSTOMER
                             REQUIREMENTS                    REQUIREMENTS




                              VALIDATION AND VERIFICATION REQUIREMENTS
PROCESS MAPPING: SWIM LANE

FUNCTION UNIT:                                      PROCESS NAME:
           ACTOR                  TASKS LANE                 TASK LANE                TASKS LANE
Actor 1                  Step 1 - Start             Step 4                     Step 6 -End
Actor 2                  Step 2                     Step 5
Actor 3                  Step 3



Actors:            The people, groups, teams, etc, who are performing the steps identified within the
                   process
Process:           he actual process and flow that is being tracked through its identified progression
                   steps.
Phases:            These might reflect the phases of the project, different areas of the project, or any
                   secondary set of key elements that the process flow needs to traverse to
                   successfully complete this process.
Symbols:           These are the physical symbols used to graphically represent what is happening in
                   any given step of the process.
Part 09: INFORMATION MATURITY MODEL




    MATURITY STAGE                                  DESCRIPTIONS
LEVEL 1              The organisation has no common information practices. Any pockets of
Aware                information management maturity that the organization has are based on
                     the experience and initiatives of individuals.
LEVEL 2              The organisation has little in the way of enterprise information management
Reactive             practices. However, certain departments are aware of the importance of
                     professionally managing information assets and have developed common
                     practices used within their projects. At the enterprise level, a level 2
                     organization reacts to data quality issues as they arise.
LEVEL 3              The organisation has a significant degree of information management
Proactive            maturity. Enterprise awareness, policies, procedures, and standards exist
                     and are generally utilized across all enterprise projects. At level 3, the
                     information management practices are sponsored by and managed by IT.
LEVEL 4              The organisation manages information as an enterprise asset. The business is
Managed              heavily engaged in information management procedures and takes
                     responsibility for the quality of information that they manage. A level 4
                     organisation has many mature and best-in-class practices and utilizes audits
                     to ensure compliance across all projects.
LEVEL 5              The organisation considers information to be as much an enterprise asset as
Optimized            financial and material assets. A level 5 organisation has best-in-class
                     information management practices that are utilized across all enterprise
                     projects. The distinguishing characteristic of a level 5 organisation is the
                     focus on continuous improvement. At level 5, all data management
                     practices and assets are regularly measured and the results are analysed as
                     the basis for process improvement.
Part 10: DATA AND APPLICATION MODEL

Data Dictionary
Data dictionary is an organized collection of data elements names and definitions arranged in a table. It
provides the reference for accurate, reliable, controllable, and verifiable data to be recorded in
databases. It makes both the users and owners to have correct and proper use and interpretation of data.
It makes them share common understanding of the meaning and descriptive characteristics of the data
that will serve the information to be generated.


                ELEMENTS                                           DESCRIPTIONS
Data Element Domain Name                  A data content topic, for example, a named data collection
                                          protocol – EMAP. Note there may be multiple domains or sub-
                                          domains within a particular data dictionary.
Data Element Number (for reference        A number associated with the data element name for use in
in data model)                            technical documents.
Data Element Name                         Commonly agreed, unique data element name. Note: there are
                                          likely to be multiple data element names for a particular
                                          domain.
Data Element Field Name                   The name used for this data element in computer programs
                                          and database schemas. It is often an abbreviation of the Date
                                          Element Name (eg. Cellular Phone Number might be assigned a
                                          field name of Cell_Ph_No).
Data Element Definition                   Description of the meaning of the data element
Data Element Unit of Measure (uom)        Scientific or other unit of measure that applies to the data
                                          element.
Data Element Precision                    The level to which the data will be reported, eg 1 mile plus or
                                          minus .001 mile
Data Element Data Type                    The type of data (e.g. Characters, Numeric, Alpha-numeric,
                                          date, list, floating point).
Data Element Size and Decimalization      The maximum field length that will be accepted by the
                                          database together with any decimal points (e.g. 30(2)) refers
                                          to a field length of 30 with 2 decimal points).
Field Constraints: Data Element is a      Required fields (Y) must be populated. Conditional fields (C)
required field (Y/N); Conditional Field   must be populated when another related field is populated
(C); or a “null” field                    (e.g. if a city name is required a zip code may also be
                                          required). “Not null” also describes fields that must contain
                                          data. “Null” means the data type is undefined (note: a null
                                          value is not the same as a blank or zero value).
Default Value                             A value that is predetermined. It may be fixed or a variable,
                                          like current date and time of the day.
Edit Mask (e.g. of actual layout)         An example of the actual data layout required, (e.g.
                                          yyyy/mm/dd).
Data Business Rules                       There are often the rules that define how data would be
                                          managed within an information system (e.g. Fish data could be
                                          coded (1=adult, 2=parr, 3=juveniles) and these codes would
                                          then be included in the data dictionary for use by developers
                                          and users. Other business rules, for example how rights to
                                          create, read, update or delete records are assigned if they are
                                          needed.
Application Use Case Identification
A use case is a methodology used in system analysis to identify, clarify, and organize system requirements.
The use case is made up of a set of possible sequences of interactions between systems and users in a
particular environment and related to a particular goal. It consists of a group of elements (for example,
classes and interfaces) that can be used together in a way that will have an effect larger than the sum of
the separate elements combined. The use case should contain all system activities that have significance
to the users. A use case can be thought of as a collection of possible scenarios related to a particular goal,
indeed, the use case and goal are sometimes considered to be synonymous.
A use case (or set of use cases) has these characteristics:
    •     Organizes functional requirements
    •     Models the goals of system/actor (user) interactions
    •     Records paths (called scenarios) from trigger events to goals
    •     Describes one main flow of events (also called a basic course of action), and possibly other ones,
          called exceptional flows of events (also called alternate courses of action)
    •     Is multi-level, so that one use case can use the functionality of another one.
                                                                                     -Defintion by TechTarget


Use Case Identification Elements
Karl Weiger - www.processimpact.com.


        COMPONENTS                                            DESCRIPTIONS
Use Case ID                  Give each use case a unique integer sequence number identifier. Alternatively,
                             use a hierarchical form: X.Y. Related use cases can be grouped in the
                             hierarchy.
Use Case Name                State a concise, results-oriented name for the use case. These reflect the
                             tasks the user needs to be able to accomplish using the system. Include an
                             action verb and a noun. Some examples:
                                     • View part number information.
                                     • Manually mark hypertext source and establish link to target.
                                     • Place an order for a CD with the updated software version.
Use Case History             Created By:
                             Supply the name of the person who initially documented this use case.
                             Date Created:
                             Enter the date on which the use case was initially documented.
                             Last Updated By:
                             Supply the name of the person who performed the most recent update to the
                             use case description.
                             Date Last Updated:
                             Enter the date on which the use case was most recently updated.
Use Case Defintion
Actors                       An actor is a person or other entity external to the software system being
                             specified who interacts with the system and performs use cases to accomplish
                             tasks. Different actors often correspond to different user classes, or roles,
                             identified from the customer community that will use the product. Name the
                             actor that will be initiating this use case and any other actors who will
                             participate in completing the use case.

Trigger                      Identify the event that initiates the use case. This could be an external
                             business event or system event that causes the use case to begin, or it could
                             be the first step in the normal flow.

Description                  Provide a brief description of the reason for and outcome of this use case, or a
                             high-level description of the sequence of actions and the outcome of
                             executing the use case.
Preconditions          List any activities that must take place, or any conditions that must be true,
                       before the use case can be started. Number each precondition. Examples:
                            1. User’s identity has been authenticated.
                            2. User’s computer has sufficient free memory available to launch task.
Postconditions         Describe the state of the system at the conclusion of the use case execution.
                       Number each postcondition. Examples:
                          1. Document contains only valid SGML tags.
                          2. Price of item in database has been updated with new value
Normal Flow            Provide a detailed description of the user actions and system responses that
                       will take place during execution of the use case under normal, expected
                       conditions. This dialog sequence will ultimately lead to accomplishing the goal
                       stated in the use case name and description. This description may be written
                       as an answer to the hypothetical question, “How do I <accomplish the task
                       stated in the use case name>?” This is best done as a numbered list of actions
                       performed by the actor, alternating with responses provided by the system.
                       The normal flow is numbered “X.0”, where “X” is the Use Case ID.
Alternative Flows      Document other, legitimate usage scenarios that can take place within this use
                       case separately in this section. State the alternative flow, and describe any
                       differences in the sequence of steps that take place. Number each alternative
                       flow in the form “X.Y”, where “X” is the Use Case ID and Y is a sequence
                       number for the alternative flow. For example, “5.3” would indicate the third
                       alternative flow for use case number 5.
Exceptions
                       Describe any anticipated error conditions that could occur during execution of
                       the use case, and define how the system is to respond to those conditions.
                       Also, describe how the system is to respond if the use case execution fails for
                       some unanticipated reason. If the use case results in a durable state change in
                       a database or the outside world, state whether the change is rolled back,
                       completed correctly, partially completed with a known state, or left in an
                       undetermined state as a result of the exception. Number each alternative flow
                       in the form “X.Y.E.Z”, where “X” is the Use Case ID, Y indicates the normal (0)
                       or alternative (>0) flow during which this exception could take place, “E”
                       indicates an exception, and “Z” is a sequence number for the exceptions. For
                       example “5.0.E.2” would indicate the second exception for the normal flow
                       for use case number 5.
Includes               List any other use cases that are included (“called”) by this use case. Common
                       functionality that appears in multiple use cases can be split out into a
                       separate use case that is included by the ones that need that common
                       functionality.
Priority               Indicate the relative priority of implementing the functionality required to
                       allow this use case to be executed. The priority scheme used must be the
                       same as that used in the software requirements specification.
Frequency of Use       Estimate the number of times this use case will be performed by the actors
                       per some appropriate unit of time.
Business Rules         List any business rules that influence this use case.
Special Requirements   Identify any additional requirements, such as nonfunctional requirements, for
                       the use case that may need to be addressed during design or implementation.
                       These may include performance requirements or other quality attributes
Assumptions            List any assumptions that were made in the analysis that led to accepting this
                       use case into the product description and writing the use case description.
Notes and Issues       List any additional comments about this use case or any remaining open issues
                       or TBDs (To Be Determineds) that must be resolved. Identify who will resolve
                       each issue, the due date, and what the resolution ultimately is.
Part 11: TECHNOLOGY REFERENCE MODEL

            COMPONENTS         CONFIGURATION ITEMS   SPECIFICATIONS
Hardware Platforms
Operating System
Application System
Database System
Network & Communication
Security System
Enterprise System Management
Development Methodologies
Standards
Interoperatability
Part 12: INFORMATION SECURITY MODEL

The Security Domain defines the roles, technologies, standards, and policies necessary to protect the
information assets of the state and citizens from any form of unauthorized access. The Security Domain
defines the security and access management principles that are applied to ensure the appropriate level of
access to NM’s information assets. This domain comprises standards for identification, authentication,
authorization, administration, audit, and naming services.

        COMPONENTS                                            DESCRIPTIONS
PHYSICAL SECURITY                Securing access to hardware, inventory, and disposition of physical
                                 equipment and records.
USER SECURITY                    Ensuring that users accessing data and systems are in fact who they say
                                 they are and that they have access only to authorized resources.
                                 Functions include the identification, authentication, and authorization of
                                 an individual, as well as audit requirements.
APPLICATION SECURITY             ensuring that an application that accesses another application or data is
                                 secure; includes the analysis of distributed, proxy, and middleware
                                 services.
SYSTEMS SECURITY                 Overall systems security analysis, including the user, data transmission,
                                 and the host server, as well as remote links and access from other
                                 systems, and encryption.
DATA SECURITY                    Both physical and logical data protection, including loss of data through
                                 mechanical failure, electrical failure, or viruses. Includes backup
                                 procedures, off-site storage, access audit.
NETWORK SECURITY                 It includes the physical and electical links between the desktop and the
                                 host, LAN/WAN, use of internet, dial-up, wireless.
SECURITY ADMINISTRATION          Periodic reviews of policies, the design and review of systems (proposed
                                 or existing). Includes periodic testing of security plans. Generally, this is
                                 broken up between Administrators (who focus on individual systems) and
                                 an Information Security Officer (larger enterprise focus.)
SOCIAL ENGINEERING AND           Many techniques used to compromise systems are based on deceptive
HUMAN FACTORS                    practices aimed at individual users or employees. Security awareness
                                 must be heightened at all levels of the organization and procedures
                                 developed to positively identify requestors of information and their
                                 legitimate purposes.
MALWARE                          Viruses, Trojans, spyware, and other malicious code.
INCIDENT RESPONSE TEAM           coordinated incident response for miscellaneous incident that may occur
                                 across the state.
Part 13: MODEL OF STRATEGIC PLANNING
Strategic Alignment Model
(Venkatraman, Henderson and Oldach)




The difficulty to realize value from IT investments is firstly due to the lack of alignment between the business and IT
strategy of the organizations that are making investments, and secondly due to the lack of a dynamic administrative process
to ensure continuous alignment between the business and IT domains.

Strategy Execution         This perspective views the business strategy as the driver of both organization design choices and the logic of IS
                           infrastructure (the classic, hierarchical view of strategic management). T Management is strategy formulator
                                                                                                     op                                      ,
                           IS Management is strategy implementer [Arrow 1]
                                                                     .

Technology Potential       This perspective also views the business strategy as the driver however involves the articulation of an IT
                                                                                         ,
                           strategy to support the chosen business strategy and the corresponding specification of the required IS
                           infrastructure and processes.
                           The top management should provide the technology vision to articulate the logic and choices pertaining to IT
                           strategy that would best support the chosen business strategy while the role of the IS manager should be that
                                                                                          ,
                           of the technology architect - who efficiently and effectively designs and implements the required IS
                           infrastructure that is consistent with the external component of IT strategy (scope, competences and
                           governance). [Arrow 2]

Competitive Potential      This alignment perspective is concerned with the exploitation of emerging IT capabilities to impact new
                           products and services (i.e., business scope), influence the key attributes of strategy (distinctive competences),
                           as well as develop new forms of relationships (i.e. business governance). Unlike the two previous perspectives
                           that considered business strategy as given (or a constraint for organizational transformation), this perspective
                           allows the modification of business strategy via emerging IT capabilities.
                           The specific role of the top management to make this perspective succeed is that of the business visionary who
                                                                                                                                       ,
                           articulates how the emerging IT competences and functionality as well as changing governance patterns in the
                           IT marketplace would impact the business strategy The role of the IS manager in contrast, is one of the
                                                                               .                           ,
                           catalyst, who identifies and interprets the trends in the IT environment to assist the business managers to
                           understand the potential opportunities and threats from an IT perspective. [Arrow 3]

Service Level              This alignment perspective focuses on how to build world class IT/IS organization within an organization. In this
                           perspective, the role of business strategy is indirect. This perspective is often viewed as necessary (but not
                           sufficient) to ensure the effective use of IT resources and be responsive to the growing and fast-changing
                           demands of the end-user population.
                           The specific role of the top management to make this perspective succeed is that of the prioritizer who
                                                                                                                                ,
                           articulates how best to allocate the scarce resources both within the organization as well as in the IT
                           marketplace (in terms of joint ventures, licensing, minority equity investments, etc.). The role of the IS
                           manager in contrast, is one of business leadership, with the specific tasks of making the internai business
                                    ,
                           succeed within the operating guidelines from the top management. [Arrow 4]
The Test of Effective Strategy

                   THE TESTS                                                THE INDICATORS
Goodness of Fit Test
                                                       The stategy has to be well matched to industry and
                                                       competitive conditions, market opportunities and
                                                       threats, and other aspects of the enterprise's external
                                                       environment.

                                                       It has to be tailored to the company's resource strengths
                                                       and weaknesses, competencies, and competitive
                                                       capabilities.


Competetive Advantage Test
                                                       The effective strategy leads to sustainable competitive
                                                       advantage.


                                                       The bigger the competitive edge that a strategy helps
                                                       build, the more powerful and effective it is.


Performance Test                                       The effective strategy boosts company performance.

                                                       Two kinds of performance improvements are the most
                                                       telling of a strategy's caliber: gains in profitability and
                                                       gains in the company's competitive strength and long-
                                                       term market position.


The Type of Organizational Goals

Strategic Goals              These are set of directives at the top of an organization and directly support the
                             mission statement. Strategic goals are related to the entire organization instead of
                             any one department.
Tactical Goals               These are goals and objectives that are directly related to the strategic goals of the
                             organization. They indicate the levels of achievement necessary in the departments
                             and divisions of the organization. Tactical goals and objectives must support the
                             strategic goals of the organization.
Operation Goals              These are goals and objectives that are determined at the lowest level of the
                             organization and apply to specific employees or subdivisions in the organization.
                             They focus on the individual responsibilities of employees.
Super-ordinate Goals         These goals are important to more than one party. They are often used to
                             resolveconflict between groups.
Part 14: STRATEGIC PLAN INTERROGATIVES


  •   Internal and External Environment Scan.

      Internal (evaluation of capabilities) and external (forecast of the environment) research and
      analysis in order to identify strategic issues facing the institution.

      Driving Forces
      Restraining Forces
      Risks for Doing and Non-Doing the Strategy
      The cost of not mitigating the risks

  •   Strategic Visioning:
      Definition of the desired future state of the organization within the targeted time frame.
      (Mandate+Mission+Values -Internal and External Environment Analysis

  •   Strategic Goals Setting:

      Definition of what the organization wants to achieve based on their understanding of the
      prioritized gaps and possibilities to be managed by the different units of the organization

      It includes identification of the key performance indicators to track the progress of the plan, and
      document the achievement of the strategic vision.


  •   Strategic Approaches and Actions :

      Statement of approaches that will be used to advance and achieve the stated goals


  •   Initiatives:

      Identification of specific programs or projects to be elaborated in the planning cycles of the
      organization,and to fulfill the chosen strategies. The initiative is assigned to specific units of the
      organization for implementation.

  •   Work Plan :
      Specification of tasks to execute the initiatives, it includes the program or project scope that
      indicates the who is responsible, when to happen, what are the high level requirements, and how
      much are resources to be used.

  •   Strategic Outcomes:

      Tangible results to be realized in pursuing the strategy and actions.

      Outcome-Based objectives
      Specific and measurable statement of results to be achieved by the strategic plan in relation to its
      stakeholders perception, behavior, performance expectations, and competitions.
Part 15: ENTERPRISE ARCHITECTURE AND STRATEGIC PLANNING WORK PLAN


ORGANIZE      1.    Identify and engage the service of the Mentoring Consultant, Technical Consultants,
                    Technical Facilitators and Researchers
              2.    Assist and coordinate with the AGENCY NAME ICT Services Strategic Planning Committee
              3.    Define and agree on the strategic planning framework, tasks and timetable
DISCOVER      1.    Set the organizational assessment framework for the strategic planning
              2.    Identify the specific issues or decisions that the strategic planning should address
              3.    Identify the information that must be collected
              4.    Conduct Focus Group Discussions on the situational assessment
                              a. The Mandate, Laws and Standards
                              b. Technical and Business Units and Business Processes
                              c. Current Organizational Strategies and Limitations
                              d. Best Practices and International Trends
                              e. Future Organizational Strategies and Directions
                              f. The Enterprise Architecture
              3.    Gather and create summary presentation of the information gathered from the key
                    technical and business areas of the organization
              4.    Assess the information needs/requirements of the agency
              5.    Assess the existing IT infrastructure (i.e., hardware, software, network, special
                    solutions/devices, etc.) as to its applicability and further use
DEFINE        3.    Revisit the mandate, mission, vision and values of the organization
              4.    Define the aim, goals, and objectives of ICT services aligned to the mission, vision,
                    values, and business ends of the organization
              5.    Identity the strategic directions of the agency
              6.    Define the Enterprise Architecture aligned to the strategic directions
              7.    Define what it takes to realize the strategic directions
              8.    Define the ICT service projects or components of the business case
              9.    Define the metrics of success or key performance indicators
              10.   Define the best practice references
              11.   Identify the key areas of the plan requiring specific technical experts
              12.   Identify the necessary upgrades and replacements that must be made to the IT
                    infrastructure using lifecycle management practices for infrastructure and technologies
                    employed
              13.   Identify the information systems necessary to support the mandate of the AGENCY NAME.
              14.   Define other ICT projects that need to be included in the AGENCY NAME budget forecasts
                    and to be prioritized within the next three (3) years.
              15.   Identify the criteria in the selection of the appropriate systems integration/solutions
                    provider for the eventual implementation of the ISSP.
DRAFT         1.    Consolidate the input derived from the focus discussion and research
              2.    Design and develop the AGENCY NAME Enterprise Architecture (EA) document
              3.    Develop a three (3) year Information Systems Strategic Plan (ISSP) that would serve as the
                    “blueprint” of AGENCY NAME in the various aspects of technology, solutions, IT strategies,
                    IS strategies, IT manpower support and budgetary requirements, among others.
              4.    Ensure that the developed ISSP is in conformance to the requirements of the regulatory
                    bodies in the Philippine Government primarily as it related to monitoring, approval and
                    implementation of the ICT vision of the agency.
              5.    Prepare an ISSP that conforms to the NCC format (M.O. 2003-02)
              6.    Prepare the E-commerce Plan of the agency in support of the E-commerce Law so that the
                    agency maximizes the use of the Internet in the various aspects of operational and
                    strategic thrusts.
              7.    Prepare the ICT Projects Investment Roadmap that considers hardware, software and
                    network infrastructure, information systems, and other ICT projects that need to be
                    included in the AGENCY NAME budget forecasts and to be prioritized within the next three
                    (3) years.
              8.    Conduct a stakeholders and users review
              9.    Revise and submit for final approval
IMPLEMENT     1.    Define implementation and monitoring process of the project outcomes and
                    recommendations
              2.    Facilitate the organizational definition of the Implementation Oversight Committee
              3.    Define and perform a technology transfer program to ensure that AGENCY NAME
                    management and the corresponding staff of the agency understand the conceptual and
                    operational aspects of the deliverables
              4.    Conduct training on ICT Project Management
              5.    Conduct training on ICT Subcontract Management
Part 16: STRATEGIC PLANNING INPUT AND THINKING TOOLS
Environmental Scanning:
   1. Strengths are internal factors that create value.
   2. Weakness are internal factors that destroy value.
   3. Opportunity are external factors that create value.
   4. Threats are external factors that destroy value.

                                             THE S.W.O.T. MATRIX
PERFORMANCE AREAS            1. STRENGTH         2. WEAKNESS       3. OPPORTUNITY         4. THREATS
Mandate
Organization
Culture
People
Services/Products
Process
Data
Application
ICT Configuration
ICT Security


ICT Configuration Baseline:
   1. Availability - The condition that the ICT asset is ready for use.
   2. Reliability - The conditon that the ICT asset is able to perform its required functions under stated
          conditions for a specified period of time
   3. End of life – The time when the ICT assets is deemed retire or obsolete.

  ICT ASSETS           BUSINESS           NUMBER        AVAILABILITY      RELIABILITY      END OF LIFE
                       LOCATION                           STATUS            STATUS
Servers
Workstations
Network Devices
Operating
Software
Server Application
Software
Workstation
Application
Software
Security Software
Bandwidth
Services
ICT Worker
ICT Experts
Service Providers
Strategic Goal Setting:
   1. What do you want that you don't have? (Achieve)
   2. What do you want that you already have? (Preserve)
   3. What don't you have that you don't want? (Avoid)
   4. What do you have now that you don't want? (Eliminate)


                                     THE STRATEGIC GOALS GRID

PERFORMANCE AREAS          ACHIEVE           ELIMINATE           PRESERVE           AVOID
Mandate
Organization
Culture
People
Services/Products
Process
Data
Application
ICT Configuration
ICT Security




Strategic Actions:

  PERFORMANCE        STRATEGIC GOALS         ACTIVITIES       KEY PERFORMANCE CRITICAL SUCCESS
     AREAS                                                       INDICATORS       FACTORS
Mandate
Organization
Culture
People
Services/Products
Process
Data
Application
ICT Configuration
ICT Security
Strategic Investments:

   STRATEGIC GOAL         ACTIVITIES    TIMELINES     SERVICES/GOODS    ESTIMATED
                                                       REQUIREMENT       BUDGET
Goal 1:


Goal 2:


Goal 3:


Goal 4:


Goal 5:



Strategic ICT Projects:

  STRATEGIC GOALS     ICT PROJECT      STAKEHOLDERS     BUSINESS       DELIVERABLES
                          NAME                        REQUIREMENTS
Goal 1:


Goal 2:


Goal 3:


Goal 4:


Goal 5:



Strategic ICT Configuration Requirements:

  BUSINESS AREA     ICT OBJECTIVES      HARDWARE        SOFTWARE         SERVICES
Business Area 1:


Business Area 1:


Business Area 1:
Part 17: STRATEGIC PLAN AUTHORING TEMPLATE
Executive Summary

PART 1: ORGANIZATIONAL PROFILE
DEPARTMENT/AGENCY VISION/MISSION STATEMENT
      A.1. Mandate

         • Legal Basis
         • Functions
      A.2. Vision

         • End view statement of for the agency
      A.3. Mission

         •   Statements of outcome directives for the agency

      A.4. Strategic Thrusts and Program

         •   Strategic Thrust 1:
                 o Program Item    1:
                 o Program Item    2:
                 o Program Item    3
         •   Strategic Thrust 2:
                 o Program Item    4
                 o Program Item    5
                 o Program Item    6

DEPARTMENT/AGENCY PROFILE
      B.1. Name of Designation Information Systems Planner
         • Plantilla Position
         • E-mail Address
      B.2. CURRENT ANNUAL BUDGET

                             FUND SOURCES                      AMOUNTS
             GAA
             ODA
             Others:



      B.3. ORGANIZATIONAL STRUCTURE
                               COMPONENTS                      COUNTS
            Employees
            Regional/Extension Offices
            Provincial Offices
            Other Offices:
B.4. ORGANIZATIONAL FUNCTIONAL CHART
               • Functional Flow Chart

            C. THE DEPARTMENT AND ITS ENVIRONMENT
                ▪ Functional interface chart



            D. PRESENT ICT SITUATION (STRATEGIC CHALLENGE)            –AS-IS-STATUS AND GAPS


                •   What are the mission/critical services –level and status of computerization
                •   What is the availability and status of office automation
                •   What is the availability and level of web presence
                •   What is the state of people capability on ICT use
                •   What is the availability status of computer resources against the number of
                    employees and agency sites
                •   What are the ICT reality against the business operation of the agency

            E. STRATEGIC CONCERNS FOR ICT USE
                E.1 DESCRIPTION:

                •   What kinds of strategic gaps that information and communications technology
                    shall be able to fill-in?
                •   What kind of changes or improvement requirements that the use of ICT shall be
                    able to enable?
                •   What kind of agency risks that the use of ICT shall be able to mitigate?
                •   In what functions of the agency that the use of ICT shall have high level of impact
                    in terms of service quality, efficiency, timeliness, accountability and security?


                E.2 DETAILS

Major Functions                   Critical                Problems                   Intended Use
                          Management/Operating                                           Of ICT
                             Business Systems
Back Office               - Human resource           - Issues on personnel    - Establish the networked
Administrative Support    management system          record keeping           based communication
                          - Financial Management     - Efficiency issues in   system
                          System                     the manual               - Improved the business
                          - Assets and Property      recording and            process through the use of
                          Management System          processing of the        automated applications
                          - Legal Management         back office systems      - Deploy ICT service
                          System                     - Issues on the          management applications
                          - ICT Service Management   service delivery and     to insure capability and
                          System                     support                  performance of the ICT
                          Communication              management of IT         support units.
                          Management System




    PART 2: NFORMATION SYSTEMS STRATEGY
CONCEPTUAL FRAMEWORK FOR INFORMATION SYSTEM

        input-storage-process-output-sharing model

DETAILED DESCRIPTION OF THE ICT PROJECTS

             ICT PROJECT 1:
             B.1.1 PROJECT NAME:

             Intranet System

             B.1.2 DESCRIPTION:

             The project entails the design and development of the secured network
             infrastructure that will connect physically all the functional units and
             responsible personnel into the agency-wide information system. On top of the
             secured network run the web-based communication, collaboration, content
             publication and file sharing applications.

             B.1.3 STATUS:

             Proposed



DETAILED DESCRIPTION OF INFORMATION SYSTEMS

   NAME OF          DESCRIPTION            STATUS      DEVELOPMENT                   COMPUTING SCHEME
 INFORMATION                                             STRATEGY
   SYSTEM /
  SUBSYSTEMS
                                                                               EXISTING          PROPOSE
Intranet System   Network                   None      Out-source
                  infrastructure to                                                 NONE        NETWORKED
                  run web based
                  communication,
                  collaboration,
                  publication and
                  file sharing
                  applications



IMPACT AND LINKAGES OF INFORMATION SYSTEM

   NAME OF                       IMPACTS                                       LINKAGES
 INFORMATION
   SYSTEM /
  SUBSYSTEMS
                  Strategic Thrusts        Benefits                Internal Users                External
                     & Programs
                                                         Owner(s)               User(s)           User(s)
DATABASE REQUIRED

    Name of          General Content          Status           Information             Data Archiving, Storage, Media
    Database           Description                           Systems Served
Communication       -e-mail                   None
Transaction         -attached files                         Communication         -Network data storage system
Database            -transaction                            and
                    references                              Collaboration
                    -voice and video                        system

Document            - textual                 None
Repository          - audio                                 Knowledge             -Network data storage system
Database            -video                                  Management
                    -multimedia                             System



NETWORK LAYOUT

               Network diagram of existing configuration and planned requirements



PART 3: INFORMATION AND COMMUNICATIONS TECHNOLOGY SOLUTIONS
ICT SOLUTIONS OF THE INFORMATION SYSTEMS

    Name of Information Systems                                            ICT Solutions
                                                       Existing                                     Proposed
Communication & Collaboration          None                                       - structured cabling and network
System                                                                            - intranet web server, application
                                                                                  server, security server, database
                                                                                  server, active directory server, web
                                                                                  mail, ftp server, file server, and IP
                                                                                  telephony exchange server
ICT STRATEGY FOR PUBLIC ACCESS

      How will the public gains access to the service.
PART 4: INFORMATION AND COMMUNICATIONS TECHNOLOGY SOLUTIONS
ICT RESOURCE REQUIREMENTS
               A.1. HARDWARE


     ITEMS                                                  NUMBER OF UNITS

                        EXISTING              YEAR 1              YEAR 2                   YEAR 3              TOTAL
Computer
Servers
Computer
Workstations




               A.1.1 NETWORK AND TELECOMMUNICATIONS


     ITEMS                                                  NUMBER OF UNITS

                        EXISTING              YEAR 1              YEAR 2                   YEAR 3              TOTAL
Network Server

Network Hubs
A.1.2 DEPLOYMENT OF ICT EQUIPMENT


    NAME OF OFFICE/                        ITEMS                                    NUMBER OF UNITS
  ORGANIZATIONAL UNITS
                                                                         EXISTING                      PROPOSED




               A.2. SOFTWARE


   ITEM          VERSION         LICENSE                                  NUMBER OF LICENSES
                                   TYPE                                         TYPE

                                                   EXISTING     YEAR 1          YEAR 2            YEAR 3      TOTAL
 Network
Operating
System
Desktop
Operating
System
Office
Productivity
Suite




               A.3. ICT SERVICES


      TYPE                                                    NUMBER OF UNITS

                      EXISTING                YEAR 1              YEAR 2                 YEAR 3             TOTAL




               A.4. ICT MANPOWER AND ORGANIZATIONAL STRUCTURE


               A.4.1 DEPLOYMENT OF ICT EQUIPMENT


      TYPE                                                    NUMBER OF UNITS

                      EXISTING                YEAR 1              YEAR 2                 YEAR 3             TOTAL
A.4.2 EXISTING ICT ORGANIZATIONAL STRUCTURE




            A.4.3 PROPOSED ICT ORGANIZATIONAL STRUCTURE




            A.4.4 .PLACEMENT OF THE PROPOSED ICT ORGANIZATIONAL STRUCTURE IN THE
            AGENCY ORGANIZATION CHART



            A.4.5 ICT TRAINING NEEDS


                 ICT COURSES                               NUMBER OF TARGET PARTICIPANTS

                            TITLE
CLASSIFICATION           DESCRIPTION            YEAR 1        YEAR 2            YEAR 3       TOTAL




            B.OTHER RESOURCES


    ITEMS                                       NUMBER OF UNITS

                    EXISTING           YEAR 1        YEAR 2             YEAR 3             TOTAL




PART 5: DEVELOPMENT AND INVESTMENT PROGRAM

            A. ICT PROJECTS IMPLEMENTATION SCHEDULE


            NAME OF ICT PROJECTS                  YEAR 1               YEAR 2              YEAR 3
B. INFORMATION SYSTEMS IMPLEMENTATION SCHEDULE


  NAME OF INFORMATION / SUBSYSTEM /MODULES   YEAR 1               YEAR 2                YEAR 3




SUMMARY OF INVESTMENT


           BUDGET / ITEM ACCOUNT                      FINANCIAL REQUIREMENTS IN PESOS

                                             YEAR 1               YEAR 2                YEAR 3
TOTAL

Mais conteúdo relacionado

Mais procurados

Application Portfolio Rationalization - Whitepaper
Application Portfolio Rationalization - WhitepaperApplication Portfolio Rationalization - Whitepaper
Application Portfolio Rationalization - WhitepaperNIIT Technologies
 
Bringing Architecture Thinking to the People - An introduction into the PEOPL...
Bringing Architecture Thinking to the People - An introduction into the PEOPL...Bringing Architecture Thinking to the People - An introduction into the PEOPL...
Bringing Architecture Thinking to the People - An introduction into the PEOPL...Craig Martin
 
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~MPN Japan
 
What is Enterprise Architecture?
What is Enterprise Architecture?What is Enterprise Architecture?
What is Enterprise Architecture?BOC Group
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture FrameworksChetan Channa
 
Introduction to Enterprise Architecture
Introduction to Enterprise ArchitectureIntroduction to Enterprise Architecture
Introduction to Enterprise ArchitectureMohammed Omar
 
Creating Enterprise Value from Business Architecture
Creating Enterprise Value from Business ArchitectureCreating Enterprise Value from Business Architecture
Creating Enterprise Value from Business Architectureiasaglobal
 
Azure integration services from the IT Professional perspective
Azure integration services from the IT Professional perspectiveAzure integration services from the IT Professional perspective
Azure integration services from the IT Professional perspectiveAlessandro Moura
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureAlan McSweeney
 
Huawei's AI Strategy and Full-Stack Portfolio Launch
Huawei's AI Strategy and Full-Stack Portfolio LaunchHuawei's AI Strategy and Full-Stack Portfolio Launch
Huawei's AI Strategy and Full-Stack Portfolio LaunchHuawei Technologies
 
SOA for Enterprise Architecture
SOA for Enterprise ArchitectureSOA for Enterprise Architecture
SOA for Enterprise ArchitectureYan Zhao
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core conceptsPaul Sullivan
 
Ctrls-Company Presentation
Ctrls-Company PresentationCtrls-Company Presentation
Ctrls-Company PresentationCTRLS
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best PracticeAlan McSweeney
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture Daljit Banger
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesChaitanya Atreya
 

Mais procurados (20)

Application Portfolio Rationalization - Whitepaper
Application Portfolio Rationalization - WhitepaperApplication Portfolio Rationalization - Whitepaper
Application Portfolio Rationalization - Whitepaper
 
Bringing Architecture Thinking to the People - An introduction into the PEOPL...
Bringing Architecture Thinking to the People - An introduction into the PEOPL...Bringing Architecture Thinking to the People - An introduction into the PEOPL...
Bringing Architecture Thinking to the People - An introduction into the PEOPL...
 
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~
JPC2018[G1]Office 365 と Box で実現する近未来の働き方 ~競合だと思われていたマイクロソフトと Box が協業するワケ~
 
What is Enterprise Architecture?
What is Enterprise Architecture?What is Enterprise Architecture?
What is Enterprise Architecture?
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
Introduction to Enterprise Architecture
Introduction to Enterprise ArchitectureIntroduction to Enterprise Architecture
Introduction to Enterprise Architecture
 
Lecture 1: Introduction
Lecture 1: IntroductionLecture 1: Introduction
Lecture 1: Introduction
 
Creating Enterprise Value from Business Architecture
Creating Enterprise Value from Business ArchitectureCreating Enterprise Value from Business Architecture
Creating Enterprise Value from Business Architecture
 
Togaf introduction ver1 0
Togaf introduction ver1 0Togaf introduction ver1 0
Togaf introduction ver1 0
 
Azure integration services from the IT Professional perspective
Azure integration services from the IT Professional perspectiveAzure integration services from the IT Professional perspective
Azure integration services from the IT Professional perspective
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise Architecture
 
Huawei's AI Strategy and Full-Stack Portfolio Launch
Huawei's AI Strategy and Full-Stack Portfolio LaunchHuawei's AI Strategy and Full-Stack Portfolio Launch
Huawei's AI Strategy and Full-Stack Portfolio Launch
 
SOA for Enterprise Architecture
SOA for Enterprise ArchitectureSOA for Enterprise Architecture
SOA for Enterprise Architecture
 
Togaf introduction and core concepts
Togaf introduction and core conceptsTogaf introduction and core concepts
Togaf introduction and core concepts
 
Ctrls-Company Presentation
Ctrls-Company PresentationCtrls-Company Presentation
Ctrls-Company Presentation
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best Practice
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
 

Semelhante a ICT4GOV Enterprise Architecture Training Notes

Belladati Meetup Singapore Workshop
Belladati Meetup Singapore WorkshopBelladati Meetup Singapore Workshop
Belladati Meetup Singapore Workshopbelladati
 
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...Marc Chang Sing Pang
 
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Enterprise Knowledge
 
Analytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopAnalytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopCCG
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture pptMonsif sakienah
 
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...Richard Harbridge
 
Connecting streams of workplace innovation
Connecting streams of workplace innovationConnecting streams of workplace innovation
Connecting streams of workplace innovationPeter Oeij
 
enterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdfenterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdfFranzLawrenzDeTorres1
 
Information Architecture Profession
Information Architecture ProfessionInformation Architecture Profession
Information Architecture Professionguestd2298c
 
Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Christopher Bradley
 
Bootcamp Analitics Translator Preview Material .pdf
Bootcamp Analitics Translator Preview Material .pdfBootcamp Analitics Translator Preview Material .pdf
Bootcamp Analitics Translator Preview Material .pdfMartinAgnes
 
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu DuttAWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu DuttAmazon Web Services Korea
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008Elena Simperl
 
What is Data as a Service by T-Mobile Principle Technical PM
What is Data as a Service by T-Mobile Principle Technical PMWhat is Data as a Service by T-Mobile Principle Technical PM
What is Data as a Service by T-Mobile Principle Technical PMProduct School
 
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...Richard Harbridge
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataMaurício Garcia
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518Jonathan Stuckey
 
Service-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library ServicesService-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library ServicesRichard Akerman
 

Semelhante a ICT4GOV Enterprise Architecture Training Notes (20)

Belladati Meetup Singapore Workshop
Belladati Meetup Singapore WorkshopBelladati Meetup Singapore Workshop
Belladati Meetup Singapore Workshop
 
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
 
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
 
Analytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopAnalytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual Workshop
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture ppt
 
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...
Optimizing Organizational Knowledge With Project Cortex & The Microsoft Digit...
 
Connecting streams of workplace innovation
Connecting streams of workplace innovationConnecting streams of workplace innovation
Connecting streams of workplace innovation
 
SIA LESSON.pptx
SIA LESSON.pptxSIA LESSON.pptx
SIA LESSON.pptx
 
enterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdfenterprisearchitectureppt-181203183218.pdf
enterprisearchitectureppt-181203183218.pdf
 
Information Architecture Profession
Information Architecture ProfessionInformation Architecture Profession
Information Architecture Profession
 
Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...
 
Bootcamp Analitics Translator Preview Material .pdf
Bootcamp Analitics Translator Preview Material .pdfBootcamp Analitics Translator Preview Material .pdf
Bootcamp Analitics Translator Preview Material .pdf
 
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu DuttAWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
AWS Innovate 2016: Digital Workloads on Amazon Web Services- Santanu Dutt
 
Ontology engineering ESTC2008
Ontology engineering ESTC2008Ontology engineering ESTC2008
Ontology engineering ESTC2008
 
What is Data as a Service by T-Mobile Principle Technical PM
What is Data as a Service by T-Mobile Principle Technical PMWhat is Data as a Service by T-Mobile Principle Technical PM
What is Data as a Service by T-Mobile Principle Technical PM
 
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
 
april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
Data Science for Business Managers by TektosData
Data Science for Business Managers by TektosDataData Science for Business Managers by TektosData
Data Science for Business Managers by TektosData
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518
 
Service-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library ServicesService-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library Services
 

Mais de John Macasio

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationJohn Macasio
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemJohn Macasio
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentJohn Macasio
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerJohn Macasio
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency ModelJohn Macasio
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process ReviewJohn Macasio
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise ArchitectureJohn Macasio
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the WorkplaceJohn Macasio
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the MillenialsJohn Macasio
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation templateJohn Macasio
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information SecurityJohn Macasio
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at WorkplaceJohn Macasio
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureJohn Macasio
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureJohn Macasio
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status ChecklistJohn Macasio
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerJohn Macasio
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management EssentialsJohn Macasio
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningJohn Macasio
 

Mais de John Macasio (20)

Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Project Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital TransformationProject Management Competency Guide for Digital Transformation
Project Management Competency Guide for Digital Transformation
 
Teacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management SystemTeacher Work from Home with Learning Management System
Teacher Work from Home with Learning Management System
 
Online Distance Learning Readiness Assessment
Online Distance Learning Readiness AssessmentOnline Distance Learning Readiness Assessment
Online Distance Learning Readiness Assessment
 
Social Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked LearnerSocial Media of Online Distance Learning with Networked Learner
Social Media of Online Distance Learning with Networked Learner
 
GCIO Competency Model
GCIO Competency ModelGCIO Competency Model
GCIO Competency Model
 
Competency Modeling for Business Process Review
Competency Modeling for Business Process ReviewCompetency Modeling for Business Process Review
Competency Modeling for Business Process Review
 
Doing Enterprise Architecture
Doing Enterprise ArchitectureDoing Enterprise Architecture
Doing Enterprise Architecture
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Learn with the Millenials
Learn with the MillenialsLearn with the Millenials
Learn with the Millenials
 
Enterprise Architecture Formulation template
Enterprise Architecture Formulation templateEnterprise Architecture Formulation template
Enterprise Architecture Formulation template
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
E services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise ArchitectureE services Strategic Planning with Enterprise Architecture
E services Strategic Planning with Enterprise Architecture
 
E-School Project
E-School ProjectE-School Project
E-School Project
 
E-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise ArchitectureE-Service Planning and Enterprise Architecture
E-Service Planning and Enterprise Architecture
 
ICT Project Management Status Checklist
ICT Project Management Status ChecklistICT Project Management Status Checklist
ICT Project Management Status Checklist
 
E-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture PrimerE-Services Planning and Enterprise Architecture Primer
E-Services Planning and Enterprise Architecture Primer
 
E-Gov Project Management Essentials
E-Gov Project Management EssentialsE-Gov Project Management Essentials
E-Gov Project Management Essentials
 
Basic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services PlanningBasic Thinking Tool for E-Services Planning
Basic Thinking Tool for E-Services Planning
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

ICT4GOV Enterprise Architecture Training Notes

  • 1. Course Name: Enterprise Architecture Framework and Information Systems Planning Essentials Day 1: MORNING AFTERNOON 08:00-08:30 01:00-03:00 Registration Enterprise Architecture: TOGAF FRAMEWORK 08:30-09:00 03:00-03:30 Course Orientation Coffee Break 09:00-10:00 03:30-5:00 Enterprise Architecture: Enterprise Architecture: DEFINITIONS AND STANDARDS NASCIO TOOLKIT 10:00-10:30 05:00 Coffee Break Home 10:30-12:00 Enterprise Architecture: COMPETENCY AND MATURITY 12:00 Lunch Break DAY 2 MORNING AFTERNOON 08:00-08:30 01:00-03:00 Lessons Learned Enterprise Architecture: BUSINESS ANALYSIS FRAMEWORK 08:30-10:00 03:00-03:30 Enterprise Architecture: Coffee Break ZACHMAN INTERROGATIVES 10:00-10:30 03:30-05:00 Coffee Break Enterprise Architecture: PERFORMANCE MODEL & PROCESS MAPPING 10:30-12:00 Enterprise Architecture: ARCHITECTURE COMPONENTS ELABORATION 12:00-01:00 Lunch Break DAY 3 MORNING AFTERNOON 08:00-08:30 01:00-03:00 Lessons Learned Enterprise Architecture: TECHNOLOGY REFERENCE MODEL 08:30-10:00 03:00-03:30 Enterprise Architecture: Coffee Break INFORMATION MATURITY MODEL 10:00-10:30 03:30-05:00 Coffee Break Enterprise Architecture: INFORMATION SYSTEM SECURITY MATURITY MODEL 10:30-12:00 Enterprise Architecture: DATA AND APPLICATION CONCEPTUAL MODEL 12:00-01:00 Lunch Break
  • 2. Day 4: MORNING AFTERNOON 08:00-08:30 01:00-03:00 Lessons Learned Information Systems Strategic Planning: STRATEGIC PLAN INPUT AND THINKING TOOLS 08:30-10:00 03:00-03:30 Information Systems Strategic Planning: Coffee Break MODELS OF STRATEGIC PLANNING 10:00-10:30 03:30-05:00 Coffee Break Information Systems Strategic Planning: STRATEGIC PLAN AUTHORING TEMPLATE 10:30-12:00 05:00 Information Systems Strategic Planning: Home STRATEGIC PLAN INTERROGATIVES AND WORKPLAN 12:00 Lunch Break Day 5: MORNING AFTERNOON 08:00-08:30 01:00-03:00 Lessons Learned Open Standard Software and Templates: ENTERPRISE ARCHITECTURE BUSINESS CASE AND TERMS OF REFERENCE 08:30-10:00 03:00-03:30 Open Standard Software and Templates: Coffee Break DOCUMENTATION SOFTWARE 10:00-10:30 03:30-05:00 Coffee Break Open Standard Software and Template ENTERPRISE ARCHITECTURE AND STRATEGIC PLANNING PROJECT PLAN 10:30-12:00 05:00 Open Standard Software and Templates: Home PROCESS AND DATA MODELER SOFTWARE 12:00 Lunch Break
  • 3. Training Notes Introduction: Enterprise architectures provides the “living documents” called reference models to make the organization to effectively and efficiently managed recordings, expectations, processes, configurations, metrics, work arounds, changes, relationships, collaborations, interchanges, requirement tracing, control, and marketing of the business operation. It provides a “single- reference-of-truth” to properly lead the business process improvement and the optimal value- added integration of technology in the business operation of the organization. The enterprise architecture tools provide the principles, methods, vocabulary, conventions, presentation objects, procedures, software, repositories, and artifacts in order to draw the reference models of the enterprise that speaks of its business, information, technology, and people. The drawn models are kept in digital repository and made accessible anytime when business strategic planning, enterprise performance evaluation, and program and ICT project development are initiated by the organization. It is reconfigured when new understanding about the business, information, technology, and people are brought in by the improved enterprise strategy, new program and projects, and enterprise metrics. The “Doing the Enterprise Architecture” process requires the collaborative engagement between the “minds and practitioners” running the business processes and those delivering the technology services. It is to properly compose the reference models of the organization that will make the business functional units and ICT service providers to realize the performance objectives through information and communication technology. ENTERPRISE ARCHITECTURE PRACTICE IN THE AGENCY: CHECK LIST Does your agency maintains a blueprint or matrix of all running systems, showing how YES NO NOT they interoperate, and which technology they are using? SURE Can your agency readily presents the professional and business user matrix with with YES NO NOT their requirements, and the technology services that address those requirements? SURE Does your agency have a documented map of enterprise-wide data, how data is being YES NO NOT grouped, how data are related, how data is being accessed, how data is shared, and SURE how data is secured? Are there silos of data and application in the different units of the agency? YES NO NOT SURE When your agency start a project do you have an enterprise architecture blueprint, YES NO NOT which you have to align the type of application to be designed and developed? SURE Is there a formal stage in the project life cycle where system architecture is being YES NO NOT checked against the enterprise architecture? SURE If you have any question or problem regarding architecture do you know who to seek YES NO NOT for guidance, decision and documentation? SURE Is there an official guidance and listing of all business standards, methods and and YES NO NOT tools, technical references that both IT and Business have to use, or you can use SURE whatever technology you want?
  • 4. Part 01: DEFINITIONS AND STANDARDS Enterprise Architecture Description (from various references) FEA definition: "The FEA (Federal Enterprise Architecture) consists of a set of interrelated "reference models" designed to facilitate cross-agency analysis and the identification of duplicative investments, gaps and opportunities for collaboration within and across agencies. Collectively, the reference models comprise a framework for describing important elements of the FEA in a common and consistent way. Through the use of this common framework and vocabulary, IT portfolios can be better managed and leveraged across the federal government." CIO Definitions from SearchCIO.com, posted October, 2006: "An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives. Purported advantages of having an enterprise architecture include improved decision making, improved adaptability to changing demands or market conditions, elimination of inefficient and redundant processes, optimization of the use of organizational assets, and minimization of employee turnover." NASCIO Enterprise Architecture Development Toolkit v.3.0 “Enterprise architecture defines an enterprise-wide, integrated set of components that incorporates strategic business thinking, information assets, and the technical infrastructure of an enterprise to promote information sharing across agency and organizational boundaries. The Enterprise Architecture is supported by Architecture Governance and the allied architectures of, Business, Information, Technology and Solution Architectures.” "enterprise" as any collection of organizations that has a common set of goals. For example, an enterprise could be a government agency, a whole corporation, a division of a corporation, a single department, or a chain of geographically distant organizations linked together by common ownership. TOGAF version 9.0 The term "enterprise" in the context of "enterprise architecture" can be used to denote both an entire enterprise - encompassing all of its information and technology services, processes, and infrastructure - and a specific domain within the enterprise. In both cases, the architecture crosses multiple systems, and multiple functional groups within the enterprise. CLINGER-COHEN Enterprise Architecture (EA) links the business mission, strategy, and processes of an organization to its IT strategy. It is documented using multiple architectural models or views that show how the current and future needs of an organization will be met. By focusing on strategic differentiators and working across the enterprise, there is a unique opportunity to create leverage and synergies and avoid duplication and inconsistencies across the enterprise. The key components of the EA are: • Accurate representation of the business environment, strategy and critical success factors • Comprehensive documentation of business units and key processes • Views of the systems and data that support these processes • A set of technology standards that define what technologies and products are approved to be used within an organization, complemented by prescriptive enterprise-wide guidelines on how to best apply these technology standards in creating business applications.
  • 5. Terminology Definition Source Architecture The specification that identifies components and their Software associated functionalities. It describes connectivity of Engineering components and the mapping of of functionality into Institute components. Architectures can be of different types and cover hardware, software, systems, and can be domain specific to describes business, data, application, technology, network, security, etc.. Architecture View It is a representation of the set of system elements and the IEEE relation associated with them. It represents a whole system from the perspective of related sets of concerns. Views are representations of the many system structures that are present simultaneously in software system. Architecture Framework The combination of structured processes, templates, and NASCIO governance that facilitate the elicitation and documentation of the architecture in a systematic manner. Architecture Domain High level gouping of disciplines, functional or topical OMB, NASCIO operations that form the main building block of the architectural framework. It talks of sphere of activity, interest, or functions. Architecture Component Level of details contain in specific architectural domain NASCIO Enterprise An organization supporting a defined business scope and MITRE EABOOK mission. An enterprise is comprised of interdependent resources (people, organizations, and technology) who must coordinate their functions and share information in support of a common mission Enterprise Any collection of organizations that has a common set of TOGAF goals. Enterprise Architecture Artifacts Artifacts constitute any object, or work product that is NASCIO developed as a component of the enterprise architecture. Artifacts includes trends, principles, mission, goals, objectives, strategies, capabilities, processes, processes steps, entities, attributes, relationship, subject areas, application components, application, database, network infrastructure, and configuration details. Business Architecture The high level representation of the business strategies, NASCIO intentions, functions, processess, information, and assets critical to operating the business of government successfully. Business Reference Model It is a function driven framework that describes the business OMB operation independent of the organization performing the job. It provides an organized and hierarchical construct for describing the day-to-day business operation. Data Reference Model It describes the data and information that supports the CIOGOV government agency operation from an agency and government-wide perspective. Performance Reference Model It is the standardized framework to measure the OCIO-DOI performance of major IT investments and their contribution to program performance. Technology Reference Model It is a component-driven, technical framework used to OCIO-DOI categorize the standards, specifications, and technologies that support and enable the delivery of service components and capabilities
  • 6. ENTERPRISE ARCHITECTURE CONTEXT IN GOVERNMENT MODEL Aligning the information and communications techonology services to the directives, business, information and technology architecture of the government agency.
  • 7. Part 02: COMPETENCY AND MATURITY Importance of Enterprise Architecture Schekkerman, J. (2005). Trends in Enterprise Architecture, Institute for Enterprise Architecture Development, white paper. VALUE INDICATORS DESCRIPTIONS Alignment Enterprise architecture provides the framework to enable better alignment of business and information technology objectives. The architecture used can also serve as a communication tool. Integration Enterprise architecture establishes the infrastructure that enables business rules to be consistently applied across the organization, documents data flows, uses and interfaces. Value Creation Enterprise architecture provides better measurement of information technology economic value in an environment where there is a higher potential for reusable hardware and software assets Change Management Enterprise architecture establishes consistent infrastructure and formalizing the management of the infrastructure and information assets better enables an organization-wide change management process to be established to handle information technology changes Compliance Enterprise architecture provides the artifacts necessary to ensure legal and regulatory compliance for the technical infrastructure and environment. Maturity Levels of Enterprise Architecture Program (NASCIO) Maturity Level Status Name Description LEVEL O No Program There is not a documented architectural framework in place at this level of maturity. While solutions are developed and implemented, this is done with no recognized standards or base practices. The organization is completely reliant on the knowledge of independent contributors. LEVEL 1 Informal Program The base architecture framework and standards have been defined and are typically performed informally. There is general consensus that these steps should be performed, however they may not be tracked and followed. Organizations with an Enterprise Architecture framework at this level are still dependant on the knowledge of individual contributors. LEVEL 2 Repeatable Program The base architecture and standards have been identified and are being tracked and verified. At this point in the program processes are repeatable and reusable templates are starting to be developed. The need for product and compliance components to conform to the standards and requirements has been agreed upon, and metrics are used to track process area performance. LEVEL 3 Well Defined The enterprise architecture framework is well defined; using approved Program standard and/or customized versions of the templates. Processes are documented across the organization. Performance metrics are being tracked and monitored in relationship to other general practices and process areas. LEVEL 4 Managed Program At this point performance metrics are collected, analyzed and acted upon. The metrics are used to predict performance and provide better understanding of the processes and capabilities. LEVEL 5 Continously The processes are mature; targets have been set for effectiveness and Improved Vital efficiency based on business and technical goals. There are ongoing Program refinements and improvements based on the understanding of the impact changes have to these processes.
  • 8. The Enteprise Architect Responsibilities (TOGAF) TASKS DESCRIPTIONS Understand and Probe for information, listen to information, influence people, facilitate consensus interpret building, synthesize and translate ideas into actionable requirements, articulate those requirements ideas to others. Identify use or purpose, constraints, risks, etc. The architect participates in the discovery and documentation of the customer's business scenarios that are driving the solution. The architect is responsible for requirements understanding and embodies that requirements understanding in the architecture specification. Create a useful Take the requirements and develop well-formulated models of the components of the model solution, augmenting the models as necessary to fit all of the circumstances. Show multiple views through models to communicate the ideas effectively. The architect is responsible for the overall architecture integrity and maintaining the vision of the offering from an architectural perspective. The architect also ensures leverage opportunities are identified, using building blocks, and is a liaison between the functional groups (especially development and marketing) to ensure that the leverage opportunities are realized. The architect provides and maintains these models as a framework for understanding the domain(s) of development work, guiding what should be done within the organization, or outside the organization. The architect must represent the organization view of the architecture by understanding all the necessary business components Validate, refine, and Verify assumptions, bring in subject matter experts, etc. in order to improve the model expand the model and to further define it, adding as necessary new ideas to make the result more flexible and more tightly linked to current and expected requirements. The architect additionally should assess the value of solution-enhancing developments emanating from field work and incorporate these into the architecture models as appropriate. Manage the Continuously monitor the models and update them as necessary to show changes, architecture additions, and alterations. Represent architecture and issues during development and decision points of the program. The architect is an "agent of change", representing that need for the implementation of the architecture. Through this development cycle, the architect continuously fosters the sharing of customer, architecture, and technical information between organizations CLINGER-COHEN ENTERPRISE ARCHITECT SUMMARY OF COMPETENCIES • A basic grounding in the agency’s environment, strategy and priorities • Extensive knowledge of IT capabilities, covering current and emerging technologies • Good knowledge of how similar agencies use or plan to use technology • Ability to rationalize technology opportunities and business drivers optimizing return on investment • Familiar with agency’s architectural principles and policies, able to interpret and apply • “Hands on” experience in architecture, able to perform a number of architectural tasks • Must have a mixture of BPR, business processes, and meeting facility • Strong in capability modeling • Can define and understand component capabilities and apply solutions • Ability to look at technology trends and effectively apply to business/project needs • Ability to look at and define target architecture for speciality projects • Ability to manage a repository - repository modeling and analysis • Competency in several tool sets • Ability to manage a project portal to identify concepts, work in progress, etc. • Able to identify redundancies among existing and proposed IT efforts • Ability to bring together an overall Enterprise Architecture from several individual EA efforts • Ability to develop the crux functional integration services that can be implemented in patterns
  • 9. Part 03: ENTEPRISE ARCHITECTURE FRAMEWORK: TOGAF Guidance Componets 01. Architecture Development Method Cycle Introduction to the ADM Preliminary Phase Phase A: Architecture Vision Phase B: Business Architecture Phase C: Information Systems Architectures Phase C: Information Systems Architectures - Data Architecture Phase C: Information Systems Architectures - Applications Architecture Phase D: Technology Architecture Phase E: Opportunities and Solutions Phase F: Migration Planning Phase G: Implementation Governance Phase H: Architecture Change Management ADM Architecture Requirements Management 02. Architecture Development Method Guidelines Applying Iteration to the ADM and Techniques Applying the ADM at different Enterprise Levels Security Architecture and the ADM Using TOGAF to define and Govern SOAs Architecture Principles Architecture Stakeholder Management Architecture Patterns Business Scenarios Gap Analysis Migration Planning Techniques Interoperability Requirements Business Transformation Readiness Assessment Risk Management Capability-Based Planning 03. Architecture Content Framework Introduction to the Architecture Content Framework Content Metamodel Architectural Artifacts Architectural Deliverables Building Blocks 04. Enterprise Continoum Tools Introduction Enterprise Continuum Architecture Partitioning Architecture Repository Tools for Architecture Development 05. Reference Model Foundation Architecture: TRM III-RM 06. Architecture Capability Introduction Establishing an Architecture Capability Architecture Board Architecture Compliance Architecture Contracts Architecture Governance Architecture Maturity Models Architecture Skills Framework
  • 10. Part 04: ENTERPRISE ARCHITECTURE FRAMEWORK: NASCIO DEVELOPMENT TOOLKIT TOOLKIT COMPONENTS DESCRIPTION Architecture Governance The processes necessary to direct or guide initiatives, to ensure that performance aligns with the enterprise, to enable the enterprise business by exploiting opportunities, and to ensure resources are used responsibly and architecture-related risks are managed appropriately. Business Architecture An architecture within EA that provides the high-level representation of the business strategies, intentions, functions, processes, information and assets critical to providing services to citizens, businesses, governments and the like. Business architecture should include an environmental context, market or need assessment, strategic business intent, traceability to capabilities and the management initiatives that will deliver or further leverage those enabling capabilities. Business architecture is defined by some as constituting the top two rows of the Zachman Framework. Information Architecture The compilation of the business requirements of the enterprise, the information process entities and integration that drive the business and rules for selecting, building and maintaining that information. This includes data and process architecture. Solution Architecture An architecture within EA that guides the solution architect in the design of a particulate solution set. For each solution set, Solution Architecture assists in: • The identification of business requirements, • ƒThe determination of the design specifications necessary to deliver the business requirements, • The development of the solution set design. Integrating designs based on details with the Business, Information and Technology blueprints. Technical Architecture A disciplined approach to describing the current and future structure and inter-relationships of the enterprise’s technologies in order to maximize value in those technologies. It examines the technologies that are required to run the enterprise and develops a unified vision of the enterprise’s infrastructure and technology platforms. Enterprise Architecture Facilitation A guide on building the enterprise architecture team, and the Guide tasks to be performed in implementing an enteprise architecture program for the government enterprise.
  • 11. Part 05: ZACHMAN ARCHITECTURE INTERROGATIVES The focus of an enterprise architects is to elaborate, analyze, and build the relationships among technology, information and business viewpoints in the acquisition and development of solutions … It makes sure that the organization can flexibly integrate with changes demanded by market positioning, innovation, etc. John Zachman provides the detailed components to describe the enteprise architecture. PERSPECTIVES WHAT HOW WHERE WHO WHEN WHY OBJECTIVES/ List of things List of processes List of location List of List of business List of business SCOPES important to the enterprise the enterprise organizational events or cycles goals and the enterprise performs operates units stategies BUSINESS MODEL Entity Business Process Logistic Network Organizational Business Master Business Plan Relationship Model (physical (Nodes and Links) Charts with Roles Schedule Diagram data flow and Skills Sets diagram) INFORMATION Data Model Application Distributed Human Interfaces Dependency Business rule SYSTEM MODEL Data Dictionary Model and Data System Model (role, data Diagram, Entity model Flow Diagram Architecture , access) Life History TECHNOLOGY Data Systems Design Systems User Interface, Control Structure Business rule MODEL Architecture Structure Chart, Architecture Usability, -Control Flow design (Elements, Pseudo Code (Hardware, Security Design Diagram relational Software, tables) Network) DETAILED Data Design, Detailed Program Network User Screen and Timing Defintion Program Logic REPRESENTATION Physical Storage Design Architecture Security Rules Design Architecture Specifications FUNCTIONING Converted Data Executable Communication Trained People Business Events Enforced Rules SYSTEM Program Facilities
  • 12. Part 06: ARCHITECTURE COMPONENT ELABORATION BUSINESS ARCHITECTURE Understanding how the business is Identify Business Model  Business running, what are its needs, what is Functions and WHO Performs the missing and what needs to be Function. changed or improved. Definition of Business Goals and It defines the business strategy, Goals, the supporting processes, governance, organization, and key workflow, policies and business processes of the procedures. organization. Assessment of the Current State and Description of the Future State. How are the goals and objectives implemented through the ICT Solutions and the supporting technical infrastructure. DATA ARCHITECTURE It defines how data is stored, Data Element managed, and used in a system. It Data Flow Diagram establishes common guidelines for Entity Relationship data operations that make it possible Relational Structure to predict, model, and control the Data Physical Storage flow of data in the system. Data Interoperatibility Data Standard It describes the structure of an Supported Informational Themes organization's logical and physical data assets and the associated data management resources APPLICATION ARCHITECTURE Application architecture consists of Current inventory of applications logical systems that manage the data and components. objects in the data architecture and support the business functions in the Evolving applications and Business Architecture. components needed to fulfill for the business units. It provides a blueprint for the Migration plans for moving the individual application systems to be EXISTING portfolio toward the deployed, the interactions between PLANNED portfolio the application systems, and their relationships to the core business processes of the organization TECHNOLOGY ARCHITECTURE It describes current and future Hardware Platform technical infrastructure and specific Operating System hardware and software technologies Application System that support the Agency information Database System systems. It provides guidance and Network & Communication System principles for implementing Security System technologies within the application Enterprise Systems Management architecture. Development Methods Technical Standards It describes the hardware, software Interoperatability References and network infrastructure needed to support the deployment of core, mission-critical applications.
  • 13. NASCIO ENTERPRISE ARCHITECTURE DEVELOPMENT TOOLKIT – EA DOMAINS BUSINESS REFERENCE It provides an organized, hierarchical construct for describing the day-to-day MODEL business operations of the Federal government. While many models exist for describing organizations - org charts, location maps, etc. - this model presents the business using a functionally driven approach. The Lines of Business and Sub-functions that comprise the BRM represent a departure from previous models of the Federal government that use antiquated, stovepiped, agency-oriented frameworks. The BRM is the first layer of the Federal Enterprise Architecture and it is the main viewpoint for the analysis of data, service components and technology. DATA REFERENCE MODEL It describes, at an aggregate level, the data and information supporting government program and business line operations. This model enables agencies to describe the types of interaction and exchanges occurring between the Federal government and citizens. The DRM categorizes government information into greater levels of detail. It also establishes a classification for Federal data and identifies duplicative data resources. A common data model will streamline information exchange processes within the Federal government and between government and external stakeholders. "Data dictionary" will enable the development of common data identification "tags" that will facilitate information exchange both within the Federal government between the government and its external stakeholders The DRM provides a standard means by which data may be described, categorized, and shared. These are reflected within each of the DRM’s three standardization areas: • Data Description: Provides a means to uniformly describe data, thereby supporting its discovery and sharing • Data Context: Facilitates discovery of data through an approach to the categorization of data according to taxonomies; additionally, enables the definition of authoritative data assets within a community of interest (COI) • Data Sharing: Supports the access and exchange of data where access consists of ad-hoc requests (such as a query of a data asset), and exchange consists of fixed, re-occurring transactions between parties SERVICE REFERENCE It is a business and performance-driven, functional framework that classifies MODEL Service Components with respect to how they support business and/or performance objectives. The SRM is intended for use to support the discovery of government-wide business and application Service Components in IT investments and assets. The SRM is structured across horizontal and vertical service domains that, independent of the business functions, can provide a leverage-able foundation to support the reuse of applications, application capabilities, components, and business services. TECHNICAL REFERENCE The Technical Reference Model (TRM) provides a foundation to categorize MODEL the standards, specifications, and technologies to support the construction, delivery, and exchange of business and application components (Service Components) that may be used and leveraged in a Component-Based or Service-Oriented Architecture. The TRM unifies existing Agency TRMs and E-Gov guidance by providing a foundation to advance the re-use of technology and component services from a government-wide perspective.
  • 14. Part 07: BUSINESS ANALYSIS FRAMEWORK Business Analysis Body of Knowledge International Institute of Business Analysis Business analysis is the set of tasks and techniques used to work as a liaison among stakeholders in order to understand the structure, policies, and operations of an organization, and recommend solutions that enable the organization to achieve its goals. COMPONENTS DESCRIPTION Business Analysis Planning and Monitoring It describes how to determine which activities are necessary to perform in order to complete a business analysis effort. It covers identifcation of stakeholders, selection of business analysis techniques, the process we will use to manage our requirements, and how we assess the progress of the work in order to make necessary changes in work effort. Enterprise Analysis It describes how we take a business need, refne and clarify the defnition of that need, and defne a solution scope that can feasibly be implemented by the business. It covers problem defnition and analysis business case development, feasibility studies, and the defnition of a solution scope. Elicitation It describes how we work with stakeholders to fnd out what their needs are and ensure that we have correctly and completely understood their needs. Requirements Analysis It describes how we progressively elaborate the solution defnition in order to enable the project team to design and build a solution that will meet the needs of the business and stakeholders. Solution Assessment and Validation Solution Assessment and Validation describes how to assess proposed solutions to determine which solution best fts the business need, identify gaps and shortcomings in solutions, and determine necessary workarounds or changes to the solution Requirements Management and It describes how we manage conficts, issues and Communication changes and ensure that stakeholders and the project team remain in agreement on the solution scope
  • 15. Part 08: PROCESS MAPPING AND PERFORMANCE MODEL Business and Process Entity Requirements Definition BUSINESS DEFINITION MATRIX MANDATE STAKEHOLDERS FUNCTIONS BUSINESS PRODUCTS CONTROLS ENTITY Core Functions Special Functions BUSINESS ENTITY BUSINESS PERFORMANCE PROCESS NAME RELATIONSHIPS LOCATIONS OBJECTIVES INFORMATION REQUIREMENT MAPPING BUSINESS PROCESS INFORMATION INFORMATION PROCEDURE RULES & INFORMATION INFORMATION ENTITY NAME SOURCE CAPTURE POLICIES REPORTING CUSTOMER FORM FORM PROCESS NAME: BUSINESS ENTITY: SOURCE INPUT ENTRY TASKS EXIT OUTPUT CUSTOMER REQUIREMENTS REQUIREMENTS VALIDATION AND VERIFICATION REQUIREMENTS
  • 16. PROCESS MAPPING: SWIM LANE FUNCTION UNIT: PROCESS NAME: ACTOR TASKS LANE TASK LANE TASKS LANE Actor 1 Step 1 - Start Step 4 Step 6 -End Actor 2 Step 2 Step 5 Actor 3 Step 3 Actors: The people, groups, teams, etc, who are performing the steps identified within the process Process: he actual process and flow that is being tracked through its identified progression steps. Phases: These might reflect the phases of the project, different areas of the project, or any secondary set of key elements that the process flow needs to traverse to successfully complete this process. Symbols: These are the physical symbols used to graphically represent what is happening in any given step of the process.
  • 17. Part 09: INFORMATION MATURITY MODEL MATURITY STAGE DESCRIPTIONS LEVEL 1 The organisation has no common information practices. Any pockets of Aware information management maturity that the organization has are based on the experience and initiatives of individuals. LEVEL 2 The organisation has little in the way of enterprise information management Reactive practices. However, certain departments are aware of the importance of professionally managing information assets and have developed common practices used within their projects. At the enterprise level, a level 2 organization reacts to data quality issues as they arise. LEVEL 3 The organisation has a significant degree of information management Proactive maturity. Enterprise awareness, policies, procedures, and standards exist and are generally utilized across all enterprise projects. At level 3, the information management practices are sponsored by and managed by IT. LEVEL 4 The organisation manages information as an enterprise asset. The business is Managed heavily engaged in information management procedures and takes responsibility for the quality of information that they manage. A level 4 organisation has many mature and best-in-class practices and utilizes audits to ensure compliance across all projects. LEVEL 5 The organisation considers information to be as much an enterprise asset as Optimized financial and material assets. A level 5 organisation has best-in-class information management practices that are utilized across all enterprise projects. The distinguishing characteristic of a level 5 organisation is the focus on continuous improvement. At level 5, all data management practices and assets are regularly measured and the results are analysed as the basis for process improvement.
  • 18. Part 10: DATA AND APPLICATION MODEL Data Dictionary Data dictionary is an organized collection of data elements names and definitions arranged in a table. It provides the reference for accurate, reliable, controllable, and verifiable data to be recorded in databases. It makes both the users and owners to have correct and proper use and interpretation of data. It makes them share common understanding of the meaning and descriptive characteristics of the data that will serve the information to be generated. ELEMENTS DESCRIPTIONS Data Element Domain Name A data content topic, for example, a named data collection protocol – EMAP. Note there may be multiple domains or sub- domains within a particular data dictionary. Data Element Number (for reference A number associated with the data element name for use in in data model) technical documents. Data Element Name Commonly agreed, unique data element name. Note: there are likely to be multiple data element names for a particular domain. Data Element Field Name The name used for this data element in computer programs and database schemas. It is often an abbreviation of the Date Element Name (eg. Cellular Phone Number might be assigned a field name of Cell_Ph_No). Data Element Definition Description of the meaning of the data element Data Element Unit of Measure (uom) Scientific or other unit of measure that applies to the data element. Data Element Precision The level to which the data will be reported, eg 1 mile plus or minus .001 mile Data Element Data Type The type of data (e.g. Characters, Numeric, Alpha-numeric, date, list, floating point). Data Element Size and Decimalization The maximum field length that will be accepted by the database together with any decimal points (e.g. 30(2)) refers to a field length of 30 with 2 decimal points). Field Constraints: Data Element is a Required fields (Y) must be populated. Conditional fields (C) required field (Y/N); Conditional Field must be populated when another related field is populated (C); or a “null” field (e.g. if a city name is required a zip code may also be required). “Not null” also describes fields that must contain data. “Null” means the data type is undefined (note: a null value is not the same as a blank or zero value). Default Value A value that is predetermined. It may be fixed or a variable, like current date and time of the day. Edit Mask (e.g. of actual layout) An example of the actual data layout required, (e.g. yyyy/mm/dd). Data Business Rules There are often the rules that define how data would be managed within an information system (e.g. Fish data could be coded (1=adult, 2=parr, 3=juveniles) and these codes would then be included in the data dictionary for use by developers and users. Other business rules, for example how rights to create, read, update or delete records are assigned if they are needed.
  • 19. Application Use Case Identification A use case is a methodology used in system analysis to identify, clarify, and organize system requirements. The use case is made up of a set of possible sequences of interactions between systems and users in a particular environment and related to a particular goal. It consists of a group of elements (for example, classes and interfaces) that can be used together in a way that will have an effect larger than the sum of the separate elements combined. The use case should contain all system activities that have significance to the users. A use case can be thought of as a collection of possible scenarios related to a particular goal, indeed, the use case and goal are sometimes considered to be synonymous. A use case (or set of use cases) has these characteristics: • Organizes functional requirements • Models the goals of system/actor (user) interactions • Records paths (called scenarios) from trigger events to goals • Describes one main flow of events (also called a basic course of action), and possibly other ones, called exceptional flows of events (also called alternate courses of action) • Is multi-level, so that one use case can use the functionality of another one. -Defintion by TechTarget Use Case Identification Elements Karl Weiger - www.processimpact.com. COMPONENTS DESCRIPTIONS Use Case ID Give each use case a unique integer sequence number identifier. Alternatively, use a hierarchical form: X.Y. Related use cases can be grouped in the hierarchy. Use Case Name State a concise, results-oriented name for the use case. These reflect the tasks the user needs to be able to accomplish using the system. Include an action verb and a noun. Some examples: • View part number information. • Manually mark hypertext source and establish link to target. • Place an order for a CD with the updated software version. Use Case History Created By: Supply the name of the person who initially documented this use case. Date Created: Enter the date on which the use case was initially documented. Last Updated By: Supply the name of the person who performed the most recent update to the use case description. Date Last Updated: Enter the date on which the use case was most recently updated. Use Case Defintion Actors An actor is a person or other entity external to the software system being specified who interacts with the system and performs use cases to accomplish tasks. Different actors often correspond to different user classes, or roles, identified from the customer community that will use the product. Name the actor that will be initiating this use case and any other actors who will participate in completing the use case. Trigger Identify the event that initiates the use case. This could be an external business event or system event that causes the use case to begin, or it could be the first step in the normal flow. Description Provide a brief description of the reason for and outcome of this use case, or a high-level description of the sequence of actions and the outcome of executing the use case.
  • 20. Preconditions List any activities that must take place, or any conditions that must be true, before the use case can be started. Number each precondition. Examples: 1. User’s identity has been authenticated. 2. User’s computer has sufficient free memory available to launch task. Postconditions Describe the state of the system at the conclusion of the use case execution. Number each postcondition. Examples: 1. Document contains only valid SGML tags. 2. Price of item in database has been updated with new value Normal Flow Provide a detailed description of the user actions and system responses that will take place during execution of the use case under normal, expected conditions. This dialog sequence will ultimately lead to accomplishing the goal stated in the use case name and description. This description may be written as an answer to the hypothetical question, “How do I <accomplish the task stated in the use case name>?” This is best done as a numbered list of actions performed by the actor, alternating with responses provided by the system. The normal flow is numbered “X.0”, where “X” is the Use Case ID. Alternative Flows Document other, legitimate usage scenarios that can take place within this use case separately in this section. State the alternative flow, and describe any differences in the sequence of steps that take place. Number each alternative flow in the form “X.Y”, where “X” is the Use Case ID and Y is a sequence number for the alternative flow. For example, “5.3” would indicate the third alternative flow for use case number 5. Exceptions Describe any anticipated error conditions that could occur during execution of the use case, and define how the system is to respond to those conditions. Also, describe how the system is to respond if the use case execution fails for some unanticipated reason. If the use case results in a durable state change in a database or the outside world, state whether the change is rolled back, completed correctly, partially completed with a known state, or left in an undetermined state as a result of the exception. Number each alternative flow in the form “X.Y.E.Z”, where “X” is the Use Case ID, Y indicates the normal (0) or alternative (>0) flow during which this exception could take place, “E” indicates an exception, and “Z” is a sequence number for the exceptions. For example “5.0.E.2” would indicate the second exception for the normal flow for use case number 5. Includes List any other use cases that are included (“called”) by this use case. Common functionality that appears in multiple use cases can be split out into a separate use case that is included by the ones that need that common functionality. Priority Indicate the relative priority of implementing the functionality required to allow this use case to be executed. The priority scheme used must be the same as that used in the software requirements specification. Frequency of Use Estimate the number of times this use case will be performed by the actors per some appropriate unit of time. Business Rules List any business rules that influence this use case. Special Requirements Identify any additional requirements, such as nonfunctional requirements, for the use case that may need to be addressed during design or implementation. These may include performance requirements or other quality attributes Assumptions List any assumptions that were made in the analysis that led to accepting this use case into the product description and writing the use case description. Notes and Issues List any additional comments about this use case or any remaining open issues or TBDs (To Be Determineds) that must be resolved. Identify who will resolve each issue, the due date, and what the resolution ultimately is.
  • 21. Part 11: TECHNOLOGY REFERENCE MODEL COMPONENTS CONFIGURATION ITEMS SPECIFICATIONS Hardware Platforms Operating System Application System Database System Network & Communication Security System Enterprise System Management Development Methodologies Standards Interoperatability
  • 22. Part 12: INFORMATION SECURITY MODEL The Security Domain defines the roles, technologies, standards, and policies necessary to protect the information assets of the state and citizens from any form of unauthorized access. The Security Domain defines the security and access management principles that are applied to ensure the appropriate level of access to NM’s information assets. This domain comprises standards for identification, authentication, authorization, administration, audit, and naming services. COMPONENTS DESCRIPTIONS PHYSICAL SECURITY Securing access to hardware, inventory, and disposition of physical equipment and records. USER SECURITY Ensuring that users accessing data and systems are in fact who they say they are and that they have access only to authorized resources. Functions include the identification, authentication, and authorization of an individual, as well as audit requirements. APPLICATION SECURITY ensuring that an application that accesses another application or data is secure; includes the analysis of distributed, proxy, and middleware services. SYSTEMS SECURITY Overall systems security analysis, including the user, data transmission, and the host server, as well as remote links and access from other systems, and encryption. DATA SECURITY Both physical and logical data protection, including loss of data through mechanical failure, electrical failure, or viruses. Includes backup procedures, off-site storage, access audit. NETWORK SECURITY It includes the physical and electical links between the desktop and the host, LAN/WAN, use of internet, dial-up, wireless. SECURITY ADMINISTRATION Periodic reviews of policies, the design and review of systems (proposed or existing). Includes periodic testing of security plans. Generally, this is broken up between Administrators (who focus on individual systems) and an Information Security Officer (larger enterprise focus.) SOCIAL ENGINEERING AND Many techniques used to compromise systems are based on deceptive HUMAN FACTORS practices aimed at individual users or employees. Security awareness must be heightened at all levels of the organization and procedures developed to positively identify requestors of information and their legitimate purposes. MALWARE Viruses, Trojans, spyware, and other malicious code. INCIDENT RESPONSE TEAM coordinated incident response for miscellaneous incident that may occur across the state.
  • 23. Part 13: MODEL OF STRATEGIC PLANNING Strategic Alignment Model (Venkatraman, Henderson and Oldach) The difficulty to realize value from IT investments is firstly due to the lack of alignment between the business and IT strategy of the organizations that are making investments, and secondly due to the lack of a dynamic administrative process to ensure continuous alignment between the business and IT domains. Strategy Execution This perspective views the business strategy as the driver of both organization design choices and the logic of IS infrastructure (the classic, hierarchical view of strategic management). T Management is strategy formulator op , IS Management is strategy implementer [Arrow 1] . Technology Potential This perspective also views the business strategy as the driver however involves the articulation of an IT , strategy to support the chosen business strategy and the corresponding specification of the required IS infrastructure and processes. The top management should provide the technology vision to articulate the logic and choices pertaining to IT strategy that would best support the chosen business strategy while the role of the IS manager should be that , of the technology architect - who efficiently and effectively designs and implements the required IS infrastructure that is consistent with the external component of IT strategy (scope, competences and governance). [Arrow 2] Competitive Potential This alignment perspective is concerned with the exploitation of emerging IT capabilities to impact new products and services (i.e., business scope), influence the key attributes of strategy (distinctive competences), as well as develop new forms of relationships (i.e. business governance). Unlike the two previous perspectives that considered business strategy as given (or a constraint for organizational transformation), this perspective allows the modification of business strategy via emerging IT capabilities. The specific role of the top management to make this perspective succeed is that of the business visionary who , articulates how the emerging IT competences and functionality as well as changing governance patterns in the IT marketplace would impact the business strategy The role of the IS manager in contrast, is one of the . , catalyst, who identifies and interprets the trends in the IT environment to assist the business managers to understand the potential opportunities and threats from an IT perspective. [Arrow 3] Service Level This alignment perspective focuses on how to build world class IT/IS organization within an organization. In this perspective, the role of business strategy is indirect. This perspective is often viewed as necessary (but not sufficient) to ensure the effective use of IT resources and be responsive to the growing and fast-changing demands of the end-user population. The specific role of the top management to make this perspective succeed is that of the prioritizer who , articulates how best to allocate the scarce resources both within the organization as well as in the IT marketplace (in terms of joint ventures, licensing, minority equity investments, etc.). The role of the IS manager in contrast, is one of business leadership, with the specific tasks of making the internai business , succeed within the operating guidelines from the top management. [Arrow 4]
  • 24. The Test of Effective Strategy THE TESTS THE INDICATORS Goodness of Fit Test The stategy has to be well matched to industry and competitive conditions, market opportunities and threats, and other aspects of the enterprise's external environment. It has to be tailored to the company's resource strengths and weaknesses, competencies, and competitive capabilities. Competetive Advantage Test The effective strategy leads to sustainable competitive advantage. The bigger the competitive edge that a strategy helps build, the more powerful and effective it is. Performance Test The effective strategy boosts company performance. Two kinds of performance improvements are the most telling of a strategy's caliber: gains in profitability and gains in the company's competitive strength and long- term market position. The Type of Organizational Goals Strategic Goals These are set of directives at the top of an organization and directly support the mission statement. Strategic goals are related to the entire organization instead of any one department. Tactical Goals These are goals and objectives that are directly related to the strategic goals of the organization. They indicate the levels of achievement necessary in the departments and divisions of the organization. Tactical goals and objectives must support the strategic goals of the organization. Operation Goals These are goals and objectives that are determined at the lowest level of the organization and apply to specific employees or subdivisions in the organization. They focus on the individual responsibilities of employees. Super-ordinate Goals These goals are important to more than one party. They are often used to resolveconflict between groups.
  • 25. Part 14: STRATEGIC PLAN INTERROGATIVES • Internal and External Environment Scan. Internal (evaluation of capabilities) and external (forecast of the environment) research and analysis in order to identify strategic issues facing the institution. Driving Forces Restraining Forces Risks for Doing and Non-Doing the Strategy The cost of not mitigating the risks • Strategic Visioning: Definition of the desired future state of the organization within the targeted time frame. (Mandate+Mission+Values -Internal and External Environment Analysis • Strategic Goals Setting: Definition of what the organization wants to achieve based on their understanding of the prioritized gaps and possibilities to be managed by the different units of the organization It includes identification of the key performance indicators to track the progress of the plan, and document the achievement of the strategic vision. • Strategic Approaches and Actions : Statement of approaches that will be used to advance and achieve the stated goals • Initiatives: Identification of specific programs or projects to be elaborated in the planning cycles of the organization,and to fulfill the chosen strategies. The initiative is assigned to specific units of the organization for implementation. • Work Plan : Specification of tasks to execute the initiatives, it includes the program or project scope that indicates the who is responsible, when to happen, what are the high level requirements, and how much are resources to be used. • Strategic Outcomes: Tangible results to be realized in pursuing the strategy and actions. Outcome-Based objectives Specific and measurable statement of results to be achieved by the strategic plan in relation to its stakeholders perception, behavior, performance expectations, and competitions.
  • 26. Part 15: ENTERPRISE ARCHITECTURE AND STRATEGIC PLANNING WORK PLAN ORGANIZE 1. Identify and engage the service of the Mentoring Consultant, Technical Consultants, Technical Facilitators and Researchers 2. Assist and coordinate with the AGENCY NAME ICT Services Strategic Planning Committee 3. Define and agree on the strategic planning framework, tasks and timetable DISCOVER 1. Set the organizational assessment framework for the strategic planning 2. Identify the specific issues or decisions that the strategic planning should address 3. Identify the information that must be collected 4. Conduct Focus Group Discussions on the situational assessment a. The Mandate, Laws and Standards b. Technical and Business Units and Business Processes c. Current Organizational Strategies and Limitations d. Best Practices and International Trends e. Future Organizational Strategies and Directions f. The Enterprise Architecture 3. Gather and create summary presentation of the information gathered from the key technical and business areas of the organization 4. Assess the information needs/requirements of the agency 5. Assess the existing IT infrastructure (i.e., hardware, software, network, special solutions/devices, etc.) as to its applicability and further use DEFINE 3. Revisit the mandate, mission, vision and values of the organization 4. Define the aim, goals, and objectives of ICT services aligned to the mission, vision, values, and business ends of the organization 5. Identity the strategic directions of the agency 6. Define the Enterprise Architecture aligned to the strategic directions 7. Define what it takes to realize the strategic directions 8. Define the ICT service projects or components of the business case 9. Define the metrics of success or key performance indicators 10. Define the best practice references 11. Identify the key areas of the plan requiring specific technical experts 12. Identify the necessary upgrades and replacements that must be made to the IT infrastructure using lifecycle management practices for infrastructure and technologies employed 13. Identify the information systems necessary to support the mandate of the AGENCY NAME. 14. Define other ICT projects that need to be included in the AGENCY NAME budget forecasts and to be prioritized within the next three (3) years. 15. Identify the criteria in the selection of the appropriate systems integration/solutions provider for the eventual implementation of the ISSP. DRAFT 1. Consolidate the input derived from the focus discussion and research 2. Design and develop the AGENCY NAME Enterprise Architecture (EA) document 3. Develop a three (3) year Information Systems Strategic Plan (ISSP) that would serve as the “blueprint” of AGENCY NAME in the various aspects of technology, solutions, IT strategies, IS strategies, IT manpower support and budgetary requirements, among others. 4. Ensure that the developed ISSP is in conformance to the requirements of the regulatory bodies in the Philippine Government primarily as it related to monitoring, approval and implementation of the ICT vision of the agency. 5. Prepare an ISSP that conforms to the NCC format (M.O. 2003-02) 6. Prepare the E-commerce Plan of the agency in support of the E-commerce Law so that the agency maximizes the use of the Internet in the various aspects of operational and strategic thrusts. 7. Prepare the ICT Projects Investment Roadmap that considers hardware, software and network infrastructure, information systems, and other ICT projects that need to be included in the AGENCY NAME budget forecasts and to be prioritized within the next three (3) years. 8. Conduct a stakeholders and users review 9. Revise and submit for final approval IMPLEMENT 1. Define implementation and monitoring process of the project outcomes and recommendations 2. Facilitate the organizational definition of the Implementation Oversight Committee 3. Define and perform a technology transfer program to ensure that AGENCY NAME management and the corresponding staff of the agency understand the conceptual and operational aspects of the deliverables 4. Conduct training on ICT Project Management 5. Conduct training on ICT Subcontract Management
  • 27. Part 16: STRATEGIC PLANNING INPUT AND THINKING TOOLS Environmental Scanning: 1. Strengths are internal factors that create value. 2. Weakness are internal factors that destroy value. 3. Opportunity are external factors that create value. 4. Threats are external factors that destroy value. THE S.W.O.T. MATRIX PERFORMANCE AREAS 1. STRENGTH 2. WEAKNESS 3. OPPORTUNITY 4. THREATS Mandate Organization Culture People Services/Products Process Data Application ICT Configuration ICT Security ICT Configuration Baseline: 1. Availability - The condition that the ICT asset is ready for use. 2. Reliability - The conditon that the ICT asset is able to perform its required functions under stated conditions for a specified period of time 3. End of life – The time when the ICT assets is deemed retire or obsolete. ICT ASSETS BUSINESS NUMBER AVAILABILITY RELIABILITY END OF LIFE LOCATION STATUS STATUS Servers Workstations Network Devices Operating Software Server Application Software Workstation Application Software Security Software Bandwidth Services ICT Worker ICT Experts Service Providers
  • 28. Strategic Goal Setting: 1. What do you want that you don't have? (Achieve) 2. What do you want that you already have? (Preserve) 3. What don't you have that you don't want? (Avoid) 4. What do you have now that you don't want? (Eliminate) THE STRATEGIC GOALS GRID PERFORMANCE AREAS ACHIEVE ELIMINATE PRESERVE AVOID Mandate Organization Culture People Services/Products Process Data Application ICT Configuration ICT Security Strategic Actions: PERFORMANCE STRATEGIC GOALS ACTIVITIES KEY PERFORMANCE CRITICAL SUCCESS AREAS INDICATORS FACTORS Mandate Organization Culture People Services/Products Process Data Application ICT Configuration ICT Security
  • 29. Strategic Investments: STRATEGIC GOAL ACTIVITIES TIMELINES SERVICES/GOODS ESTIMATED REQUIREMENT BUDGET Goal 1: Goal 2: Goal 3: Goal 4: Goal 5: Strategic ICT Projects: STRATEGIC GOALS ICT PROJECT STAKEHOLDERS BUSINESS DELIVERABLES NAME REQUIREMENTS Goal 1: Goal 2: Goal 3: Goal 4: Goal 5: Strategic ICT Configuration Requirements: BUSINESS AREA ICT OBJECTIVES HARDWARE SOFTWARE SERVICES Business Area 1: Business Area 1: Business Area 1:
  • 30. Part 17: STRATEGIC PLAN AUTHORING TEMPLATE Executive Summary PART 1: ORGANIZATIONAL PROFILE DEPARTMENT/AGENCY VISION/MISSION STATEMENT A.1. Mandate • Legal Basis • Functions A.2. Vision • End view statement of for the agency A.3. Mission • Statements of outcome directives for the agency A.4. Strategic Thrusts and Program • Strategic Thrust 1: o Program Item 1: o Program Item 2: o Program Item 3 • Strategic Thrust 2: o Program Item 4 o Program Item 5 o Program Item 6 DEPARTMENT/AGENCY PROFILE B.1. Name of Designation Information Systems Planner • Plantilla Position • E-mail Address B.2. CURRENT ANNUAL BUDGET FUND SOURCES AMOUNTS GAA ODA Others: B.3. ORGANIZATIONAL STRUCTURE COMPONENTS COUNTS Employees Regional/Extension Offices Provincial Offices Other Offices:
  • 31. B.4. ORGANIZATIONAL FUNCTIONAL CHART • Functional Flow Chart C. THE DEPARTMENT AND ITS ENVIRONMENT ▪ Functional interface chart D. PRESENT ICT SITUATION (STRATEGIC CHALLENGE) –AS-IS-STATUS AND GAPS • What are the mission/critical services –level and status of computerization • What is the availability and status of office automation • What is the availability and level of web presence • What is the state of people capability on ICT use • What is the availability status of computer resources against the number of employees and agency sites • What are the ICT reality against the business operation of the agency E. STRATEGIC CONCERNS FOR ICT USE E.1 DESCRIPTION: • What kinds of strategic gaps that information and communications technology shall be able to fill-in? • What kind of changes or improvement requirements that the use of ICT shall be able to enable? • What kind of agency risks that the use of ICT shall be able to mitigate? • In what functions of the agency that the use of ICT shall have high level of impact in terms of service quality, efficiency, timeliness, accountability and security? E.2 DETAILS Major Functions Critical Problems Intended Use Management/Operating Of ICT Business Systems Back Office - Human resource - Issues on personnel - Establish the networked Administrative Support management system record keeping based communication - Financial Management - Efficiency issues in system System the manual - Improved the business - Assets and Property recording and process through the use of Management System processing of the automated applications - Legal Management back office systems - Deploy ICT service System - Issues on the management applications - ICT Service Management service delivery and to insure capability and System support performance of the ICT Communication management of IT support units. Management System PART 2: NFORMATION SYSTEMS STRATEGY
  • 32. CONCEPTUAL FRAMEWORK FOR INFORMATION SYSTEM input-storage-process-output-sharing model DETAILED DESCRIPTION OF THE ICT PROJECTS ICT PROJECT 1: B.1.1 PROJECT NAME: Intranet System B.1.2 DESCRIPTION: The project entails the design and development of the secured network infrastructure that will connect physically all the functional units and responsible personnel into the agency-wide information system. On top of the secured network run the web-based communication, collaboration, content publication and file sharing applications. B.1.3 STATUS: Proposed DETAILED DESCRIPTION OF INFORMATION SYSTEMS NAME OF DESCRIPTION STATUS DEVELOPMENT COMPUTING SCHEME INFORMATION STRATEGY SYSTEM / SUBSYSTEMS EXISTING PROPOSE Intranet System Network None Out-source infrastructure to NONE NETWORKED run web based communication, collaboration, publication and file sharing applications IMPACT AND LINKAGES OF INFORMATION SYSTEM NAME OF IMPACTS LINKAGES INFORMATION SYSTEM / SUBSYSTEMS Strategic Thrusts Benefits Internal Users External & Programs Owner(s) User(s) User(s)
  • 33. DATABASE REQUIRED Name of General Content Status Information Data Archiving, Storage, Media Database Description Systems Served Communication -e-mail None Transaction -attached files Communication -Network data storage system Database -transaction and references Collaboration -voice and video system Document - textual None Repository - audio Knowledge -Network data storage system Database -video Management -multimedia System NETWORK LAYOUT Network diagram of existing configuration and planned requirements PART 3: INFORMATION AND COMMUNICATIONS TECHNOLOGY SOLUTIONS ICT SOLUTIONS OF THE INFORMATION SYSTEMS Name of Information Systems ICT Solutions Existing Proposed Communication & Collaboration None - structured cabling and network System - intranet web server, application server, security server, database server, active directory server, web mail, ftp server, file server, and IP telephony exchange server ICT STRATEGY FOR PUBLIC ACCESS How will the public gains access to the service. PART 4: INFORMATION AND COMMUNICATIONS TECHNOLOGY SOLUTIONS ICT RESOURCE REQUIREMENTS A.1. HARDWARE ITEMS NUMBER OF UNITS EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL Computer Servers Computer Workstations A.1.1 NETWORK AND TELECOMMUNICATIONS ITEMS NUMBER OF UNITS EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL Network Server Network Hubs
  • 34. A.1.2 DEPLOYMENT OF ICT EQUIPMENT NAME OF OFFICE/ ITEMS NUMBER OF UNITS ORGANIZATIONAL UNITS EXISTING PROPOSED A.2. SOFTWARE ITEM VERSION LICENSE NUMBER OF LICENSES TYPE TYPE EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL Network Operating System Desktop Operating System Office Productivity Suite A.3. ICT SERVICES TYPE NUMBER OF UNITS EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL A.4. ICT MANPOWER AND ORGANIZATIONAL STRUCTURE A.4.1 DEPLOYMENT OF ICT EQUIPMENT TYPE NUMBER OF UNITS EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL
  • 35. A.4.2 EXISTING ICT ORGANIZATIONAL STRUCTURE A.4.3 PROPOSED ICT ORGANIZATIONAL STRUCTURE A.4.4 .PLACEMENT OF THE PROPOSED ICT ORGANIZATIONAL STRUCTURE IN THE AGENCY ORGANIZATION CHART A.4.5 ICT TRAINING NEEDS ICT COURSES NUMBER OF TARGET PARTICIPANTS TITLE CLASSIFICATION DESCRIPTION YEAR 1 YEAR 2 YEAR 3 TOTAL B.OTHER RESOURCES ITEMS NUMBER OF UNITS EXISTING YEAR 1 YEAR 2 YEAR 3 TOTAL PART 5: DEVELOPMENT AND INVESTMENT PROGRAM A. ICT PROJECTS IMPLEMENTATION SCHEDULE NAME OF ICT PROJECTS YEAR 1 YEAR 2 YEAR 3
  • 36. B. INFORMATION SYSTEMS IMPLEMENTATION SCHEDULE NAME OF INFORMATION / SUBSYSTEM /MODULES YEAR 1 YEAR 2 YEAR 3 SUMMARY OF INVESTMENT BUDGET / ITEM ACCOUNT FINANCIAL REQUIREMENTS IN PESOS YEAR 1 YEAR 2 YEAR 3 TOTAL