SlideShare a Scribd company logo
1 of 14
BCIT’s EA Model IT Service Management Strategy and Policy Business Data Application Infrastructure Presentation Service Delivery and Support Security
Technology Management ,[object Object],[object Object],[object Object]
Technology Management ,[object Object],[object Object],[object Object]
Technology Management ,[object Object],[object Object],[object Object]
Building a Technology Matrix Sept 2006 Nov 2006 Jan 2007 Feb 2007 Ongoing … Create Technology Matrix Template Pilot  With Oracle Technology Establish “ Watcher” Role (Vendor) Add Other Vendor Watchers Migrate Vendor Watchers to  Domains
Technology Lifecycle R & D Invest End of Life Watch
Technology  Lifecycle Definitions Watching (W):  includes initiatives and technologies that are being watched for maturity in industry. Research and Development (R):  includes initiatives and technologies that are currently under consideration, investigation, or evaluation for future implementation. Investing (I):  includes initiatives and technologies that are the target of resources including financial investments and/or investments of human resources.
Technology Lifecycle Definitions Sustaining (S):  includes initiatives and technologies that deliver services identified in the Core Services Catalogue or in Service Level Agreements Containing (C):  includes initiatives that have been completed and technologies that are in the process of being phased out. End of Life (E):  includes initiatives and Technologies that are retired from service
Technology Matrix Technology Matrix Attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technology Matrix - Oracle Oracle The purpose of this document is to capture BCIT's investment in Oracle technologies.  Oracle provides several technology services to the Institute and this document will be made publically available for all BCIT stakeholders access. Watching (W) Research and Development (R)  Investing (I) Sustaining (S) Containing (C)  End of Life (E) Service Name/Technology               Database  Comment 2007 S1 2007 S2 2008 S1 2008 S2 2009 S1  2009 S2                 Enterprise Manager - DBConsole 10.1.2.02 plan to implement for fall 2007 I I S S S S DataGuard Looking at for Disaster Recovery R R I S S S RDBMS 9.2.0.4 (9i) currently run in production for Autosys job scheduler C C C C E E RDBMS 9.2.0.6 (9i) currently run in production for ERP and BI S S C C E E RDBMS 10.1.2.02 (10G) plan to implement for fall 2007 I I S S S C RDBMS 11 just announced W W W W R R
Technology Chg Report - Oracle   Service Name/Technology       Application Development Comment 2007 S1 2007 S2 JDK 1.4.2_12 need to install for DST change R I Business Intelligence and Data Warehouse Comment 2007 S1 2007 S2 Oracle Warehouse Builder 10g rel 2 plan to implement an R&D project W R Client Software Comment 2007 S1 2007 S2 Jinitiator 1.3.1.26 need to install for DST change R I
Technology Watchers ,[object Object],[object Object],[object Object],[object Object]
Technology Watchers ,[object Object],[object Object],[object Object],[object Object]
Technology Watching ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006CABA
 
Effective Communication Network Development through a Model-Based Systems App...
Effective Communication Network Development through a Model-Based Systems App...Effective Communication Network Development through a Model-Based Systems App...
Effective Communication Network Development through a Model-Based Systems App...Obeo
 
The Data Centric Approach to Project Execution
The Data Centric Approach to Project ExecutionThe Data Centric Approach to Project Execution
The Data Centric Approach to Project ExecutionAVEVA Group plc
 
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...Project Controls Expo
 
EISmartwork Plant Digitization toward Industrial 4.0
EISmartwork Plant Digitization toward Industrial 4.0EISmartwork Plant Digitization toward Industrial 4.0
EISmartwork Plant Digitization toward Industrial 4.0Lee Kian Lie
 

What's hot (6)

Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006
 
Resume
ResumeResume
Resume
 
Effective Communication Network Development through a Model-Based Systems App...
Effective Communication Network Development through a Model-Based Systems App...Effective Communication Network Development through a Model-Based Systems App...
Effective Communication Network Development through a Model-Based Systems App...
 
The Data Centric Approach to Project Execution
The Data Centric Approach to Project ExecutionThe Data Centric Approach to Project Execution
The Data Centric Approach to Project Execution
 
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...
Navigating BIM waters by "Natacha Redon - Associate / BIM Lead for Identity C...
 
EISmartwork Plant Digitization toward Industrial 4.0
EISmartwork Plant Digitization toward Industrial 4.0EISmartwork Plant Digitization toward Industrial 4.0
EISmartwork Plant Digitization toward Industrial 4.0
 

Similar to BCIT's Technology Management Strategy and Policy Presentation

Alistair K Smith CV
Alistair K Smith CVAlistair K Smith CV
Alistair K Smith CVAl Smith
 
Sri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise ArchitectureSri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise ArchitectureCrishantha Nanayakkara
 
It business processes EA, SA and SOA together
It business processes   EA, SA and SOA togetherIt business processes   EA, SA and SOA together
It business processes EA, SA and SOA togetherDavid Champeau
 
Len Ashton Resume
Len Ashton ResumeLen Ashton Resume
Len Ashton ResumeLen Ashton
 
Cisco Systems Case Study: The Architecture Review Process Improving the IT P...
Cisco Systems Case Study: The Architecture Review  Process Improving the IT P...Cisco Systems Case Study: The Architecture Review  Process Improving the IT P...
Cisco Systems Case Study: The Architecture Review Process Improving the IT P...Susan Bouchard
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506Andy Maes
 
GWEA Framework 1.2 EA Forum 30 June 09
GWEA Framework 1.2 EA Forum 30 June 09GWEA Framework 1.2 EA Forum 30 June 09
GWEA Framework 1.2 EA Forum 30 June 09guestea68b0
 
Satya\'s Resume
Satya\'s ResumeSatya\'s Resume
Satya\'s Resumesqlmaster
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams
 
Oracle EBS R12.2 - Deployment and System Administration
Oracle EBS R12.2 - Deployment and System AdministrationOracle EBS R12.2 - Deployment and System Administration
Oracle EBS R12.2 - Deployment and System AdministrationMozammel Hoque
 
GEA-NZ v3.1 Application and ICT Services Reference Model and Taxonomy
GEA-NZ v3.1 Application and ICT Services Reference Model and TaxonomyGEA-NZ v3.1 Application and ICT Services Reference Model and Taxonomy
GEA-NZ v3.1 Application and ICT Services Reference Model and TaxonomyRegine Deleu
 
Golive Presentation.pptx
Golive Presentation.pptxGolive Presentation.pptx
Golive Presentation.pptxSridhar
 
TedCallowayRes 2014 BA w HC
TedCallowayRes 2014 BA w HCTedCallowayRes 2014 BA w HC
TedCallowayRes 2014 BA w HCcondor_tmc
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFxavblai
 
GEA-NZ v3.1 Infrastructure Reference Model and Taxonomy
GEA-NZ v3.1 Infrastructure Reference Model and TaxonomyGEA-NZ v3.1 Infrastructure Reference Model and Taxonomy
GEA-NZ v3.1 Infrastructure Reference Model and TaxonomyRegine Deleu
 

Similar to BCIT's Technology Management Strategy and Policy Presentation (20)

Alistair K Smith CV
Alistair K Smith CVAlistair K Smith CV
Alistair K Smith CV
 
TOGAF 9.1 by Winton.pptx
TOGAF 9.1 by Winton.pptxTOGAF 9.1 by Winton.pptx
TOGAF 9.1 by Winton.pptx
 
Sri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise ArchitectureSri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise Architecture
 
It business processes EA, SA and SOA together
It business processes   EA, SA and SOA togetherIt business processes   EA, SA and SOA together
It business processes EA, SA and SOA together
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecture
 
Satya jayanty CV
Satya jayanty CVSatya jayanty CV
Satya jayanty CV
 
Len Ashton Resume
Len Ashton ResumeLen Ashton Resume
Len Ashton Resume
 
Togaf project
Togaf projectTogaf project
Togaf project
 
Cisco Systems Case Study: The Architecture Review Process Improving the IT P...
Cisco Systems Case Study: The Architecture Review  Process Improving the IT P...Cisco Systems Case Study: The Architecture Review  Process Improving the IT P...
Cisco Systems Case Study: The Architecture Review Process Improving the IT P...
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506
 
GWEA Framework 1.2 EA Forum 30 June 09
GWEA Framework 1.2 EA Forum 30 June 09GWEA Framework 1.2 EA Forum 30 June 09
GWEA Framework 1.2 EA Forum 30 June 09
 
Satya\'s Resume
Satya\'s ResumeSatya\'s Resume
Satya\'s Resume
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
 
Oracle EBS R12.2 - Deployment and System Administration
Oracle EBS R12.2 - Deployment and System AdministrationOracle EBS R12.2 - Deployment and System Administration
Oracle EBS R12.2 - Deployment and System Administration
 
GEA-NZ v3.1 Application and ICT Services Reference Model and Taxonomy
GEA-NZ v3.1 Application and ICT Services Reference Model and TaxonomyGEA-NZ v3.1 Application and ICT Services Reference Model and Taxonomy
GEA-NZ v3.1 Application and ICT Services Reference Model and Taxonomy
 
Golive Presentation.pptx
Golive Presentation.pptxGolive Presentation.pptx
Golive Presentation.pptx
 
TedCallowayRes 2014 BA w HC
TedCallowayRes 2014 BA w HCTedCallowayRes 2014 BA w HC
TedCallowayRes 2014 BA w HC
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAF
 
Resume
ResumeResume
Resume
 
GEA-NZ v3.1 Infrastructure Reference Model and Taxonomy
GEA-NZ v3.1 Infrastructure Reference Model and TaxonomyGEA-NZ v3.1 Infrastructure Reference Model and Taxonomy
GEA-NZ v3.1 Infrastructure Reference Model and Taxonomy
 

More from Leo de Sousa

Smart Communities Roadshow 2019 - Vancouver
Smart Communities Roadshow 2019 - VancouverSmart Communities Roadshow 2019 - Vancouver
Smart Communities Roadshow 2019 - VancouverLeo de Sousa
 
UAE Higher Education CIO Council Ankabut Users Meeting October 2013
UAE Higher Education CIO Council   Ankabut Users Meeting October 2013UAE Higher Education CIO Council   Ankabut Users Meeting October 2013
UAE Higher Education CIO Council Ankabut Users Meeting October 2013Leo de Sousa
 
Create a roadmap for ea using capability maturity models
Create a roadmap for ea using capability maturity modelsCreate a roadmap for ea using capability maturity models
Create a roadmap for ea using capability maturity modelsLeo de Sousa
 
Canadian Red Cross Tainted Blood Scandal
Canadian Red Cross Tainted Blood ScandalCanadian Red Cross Tainted Blood Scandal
Canadian Red Cross Tainted Blood ScandalLeo de Sousa
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner PortalLeo de Sousa
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security ArchitectureLeo de Sousa
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security GovernanceLeo de Sousa
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Motivating Strategic Practice Development Using CMM
Motivating Strategic Practice Development Using CMMMotivating Strategic Practice Development Using CMM
Motivating Strategic Practice Development Using CMMLeo de Sousa
 
Rewards for Information Workers
Rewards for Information WorkersRewards for Information Workers
Rewards for Information WorkersLeo de Sousa
 
Flexible Leadership
Flexible LeadershipFlexible Leadership
Flexible LeadershipLeo de Sousa
 
Ford and GM A Comparison of 2 Fortune 500 Companies
Ford and GM A Comparison of 2 Fortune 500 CompaniesFord and GM A Comparison of 2 Fortune 500 Companies
Ford and GM A Comparison of 2 Fortune 500 CompaniesLeo de Sousa
 
EA - A Year of Growth
EA - A Year of GrowthEA - A Year of Growth
EA - A Year of GrowthLeo de Sousa
 
IT Service Management Overview
IT Service Management OverviewIT Service Management Overview
IT Service Management OverviewLeo de Sousa
 
Intrinsic Motivation Using Personal Learning Plans
Intrinsic Motivation Using Personal Learning PlansIntrinsic Motivation Using Personal Learning Plans
Intrinsic Motivation Using Personal Learning PlansLeo de Sousa
 
Enterprise Architecture And The Business Analyst
Enterprise Architecture And The Business AnalystEnterprise Architecture And The Business Analyst
Enterprise Architecture And The Business AnalystLeo de Sousa
 
BCIT Application Portfolio Mgmt
BCIT Application Portfolio MgmtBCIT Application Portfolio Mgmt
BCIT Application Portfolio MgmtLeo de Sousa
 

More from Leo de Sousa (17)

Smart Communities Roadshow 2019 - Vancouver
Smart Communities Roadshow 2019 - VancouverSmart Communities Roadshow 2019 - Vancouver
Smart Communities Roadshow 2019 - Vancouver
 
UAE Higher Education CIO Council Ankabut Users Meeting October 2013
UAE Higher Education CIO Council   Ankabut Users Meeting October 2013UAE Higher Education CIO Council   Ankabut Users Meeting October 2013
UAE Higher Education CIO Council Ankabut Users Meeting October 2013
 
Create a roadmap for ea using capability maturity models
Create a roadmap for ea using capability maturity modelsCreate a roadmap for ea using capability maturity models
Create a roadmap for ea using capability maturity models
 
Canadian Red Cross Tainted Blood Scandal
Canadian Red Cross Tainted Blood ScandalCanadian Red Cross Tainted Blood Scandal
Canadian Red Cross Tainted Blood Scandal
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner Portal
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Motivating Strategic Practice Development Using CMM
Motivating Strategic Practice Development Using CMMMotivating Strategic Practice Development Using CMM
Motivating Strategic Practice Development Using CMM
 
Rewards for Information Workers
Rewards for Information WorkersRewards for Information Workers
Rewards for Information Workers
 
Flexible Leadership
Flexible LeadershipFlexible Leadership
Flexible Leadership
 
Ford and GM A Comparison of 2 Fortune 500 Companies
Ford and GM A Comparison of 2 Fortune 500 CompaniesFord and GM A Comparison of 2 Fortune 500 Companies
Ford and GM A Comparison of 2 Fortune 500 Companies
 
EA - A Year of Growth
EA - A Year of GrowthEA - A Year of Growth
EA - A Year of Growth
 
IT Service Management Overview
IT Service Management OverviewIT Service Management Overview
IT Service Management Overview
 
Intrinsic Motivation Using Personal Learning Plans
Intrinsic Motivation Using Personal Learning PlansIntrinsic Motivation Using Personal Learning Plans
Intrinsic Motivation Using Personal Learning Plans
 
Enterprise Architecture And The Business Analyst
Enterprise Architecture And The Business AnalystEnterprise Architecture And The Business Analyst
Enterprise Architecture And The Business Analyst
 
BCIT Application Portfolio Mgmt
BCIT Application Portfolio MgmtBCIT Application Portfolio Mgmt
BCIT Application Portfolio Mgmt
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

BCIT's Technology Management Strategy and Policy Presentation

  • 1. BCIT’s EA Model IT Service Management Strategy and Policy Business Data Application Infrastructure Presentation Service Delivery and Support Security
  • 2.
  • 3.
  • 4.
  • 5. Building a Technology Matrix Sept 2006 Nov 2006 Jan 2007 Feb 2007 Ongoing … Create Technology Matrix Template Pilot With Oracle Technology Establish “ Watcher” Role (Vendor) Add Other Vendor Watchers Migrate Vendor Watchers to Domains
  • 6. Technology Lifecycle R & D Invest End of Life Watch
  • 7. Technology Lifecycle Definitions Watching (W): includes initiatives and technologies that are being watched for maturity in industry. Research and Development (R): includes initiatives and technologies that are currently under consideration, investigation, or evaluation for future implementation. Investing (I): includes initiatives and technologies that are the target of resources including financial investments and/or investments of human resources.
  • 8. Technology Lifecycle Definitions Sustaining (S): includes initiatives and technologies that deliver services identified in the Core Services Catalogue or in Service Level Agreements Containing (C): includes initiatives that have been completed and technologies that are in the process of being phased out. End of Life (E): includes initiatives and Technologies that are retired from service
  • 9.
  • 10. Technology Matrix - Oracle Oracle The purpose of this document is to capture BCIT's investment in Oracle technologies. Oracle provides several technology services to the Institute and this document will be made publically available for all BCIT stakeholders access. Watching (W) Research and Development (R) Investing (I) Sustaining (S) Containing (C) End of Life (E) Service Name/Technology               Database Comment 2007 S1 2007 S2 2008 S1 2008 S2 2009 S1 2009 S2                 Enterprise Manager - DBConsole 10.1.2.02 plan to implement for fall 2007 I I S S S S DataGuard Looking at for Disaster Recovery R R I S S S RDBMS 9.2.0.4 (9i) currently run in production for Autosys job scheduler C C C C E E RDBMS 9.2.0.6 (9i) currently run in production for ERP and BI S S C C E E RDBMS 10.1.2.02 (10G) plan to implement for fall 2007 I I S S S C RDBMS 11 just announced W W W W R R
  • 11. Technology Chg Report - Oracle   Service Name/Technology       Application Development Comment 2007 S1 2007 S2 JDK 1.4.2_12 need to install for DST change R I Business Intelligence and Data Warehouse Comment 2007 S1 2007 S2 Oracle Warehouse Builder 10g rel 2 plan to implement an R&D project W R Client Software Comment 2007 S1 2007 S2 Jinitiator 1.3.1.26 need to install for DST change R I
  • 12.
  • 13.
  • 14.

Editor's Notes

  1. Prior to 2006, IT Services at BCIT managed applications independently in our various groups. There was little discussion or coordination between groups resulting in several groups implementing many different applications that essentially served the same functional purpose.
  2. Prior to 2006, IT Services at BCIT managed applications independently in our various groups. There was little discussion or coordination between groups resulting in several groups implementing many different applications that essentially served the same functional purpose.
  3. Prior to 2006, IT Services at BCIT managed applications independently in our various groups. There was little discussion or coordination between groups resulting in several groups implementing many different applications that essentially served the same functional purpose.
  4. We began building our first draft portfolio in June 2006. This took some time as there was resistance to creation of the List. By late September, the majority of the list was compiled and we published it internally. An interesting thing occurred, once we published the first version of the portfolio. People at our service desk loved it and could see the value right away. Our identity management team took advantage of the list to identify key applications that we wanted to enable with IDM. Another by-product of publishing the list was, that those people who did not want to give up their “secrets” began to reveal applications that we knew nothing about. The list will continue to be updated and published regularly and will become part of our Enterprise Model.