SlideShare a Scribd company logo
Building an IT Applications inventory -
return on experience
Why inventory of IT applications is business critical?
IT applications contribute to the support of business processes or to the support other
applications, thanks to the execution of IT Software. Directly or indirectly, IT applications
have one main purpose; supporting the business in the most efficient way. They can be
considered as an enterprise’s asset.
Either custom developed, or packaged, IT applications represent a cost; licenses,
maintenance, customization, development, running fees etc…
In a large organization, due to reorganization, acquisitions or lack of coordination, it is hard
to keep track of which business processes are supported by which applications.
A trusted IT applications inventory united with process descriptions is the necessary
foundation to answer the following questions with fact-grounded confidence:
 What are the applications which support the most critical processes and which
require attention and investment?
 Are there applications which are barely or not used and for which recurring fees
occur?
 Is it possible to reduce costs by using one application instead of many applications
for the same business purpose?
 By virtue of the dependencies between applications, is business continuity at risk in
case of IT failure?
Informationquality is key
An outdated list of applications or many disparate sources of information about IT
applications cannot be used as a solid reference; no business decisions can be taken on their
basis. That’s why an inventory of applications needs to be maintained centrally.
Moreover, in order to allow the level of analysis required to answer business related
questions, it is necessary to link the applications to business processes representations; a
repository is required.
An applications repository reaches an optimal level of quality when all necessary
information is collected and signed-off.
There are two main type of information that need to be recorded:
Attributes
They store the properties of applications, like unique enterprise wide Identifier, Name,
Description, Responsibilities, Support responsibilities, assessment of Criticality which can be
in the form of a tiered classification, current Operational status, indication of update
strategy, number of users etc…
Relationships
Using a repository which integrates a database allows the documentation of relationships
between applications and other representations. Relations allow impact analysis queries
between Applications and the software products they use, the vendor providing them, the
main functionalities they support, and eventually the processes they support.
It is recommended to put in place a quality assurance mechanism that assesses the quality
of application documentation for completeness of required attributes (semantic quality) and
existence of relationships (syntactic quality). It should also include an assessment the
validity of the recorded information.
A pass score can be established to determine which applications descriptions are ready for
sign-off and promotion to the library.
Building the applications architecture is a process.
Building an applications inventory is a process that transforms a heterogeneous, redundant
and uncontrolled list of applications into a controlled catalogue placed under the
responsibility of the subject matters experts.
In order to reach the level of information quality required to allow trustworthy reference
and reporting it is necessary to ensure that each application is identified, documented and
signed off by the persons in charge of them within the enterprise.
Application inventory, constituted by the applications, their attributes and relations to other
objects, is structured content stored into a database. Yet, It is important to make sure that
initial unstructured, incomplete or approximate content may be taken into account as an
initial input.
A modelling tool that allows collaboration and sharing of application architecture views can
be used during discovery phases. Eventually, created application architecture views
constitute the graphical communication of the application inventory content stored into the
database.
Once signed-off an application is ready to be placed under architecture control. It is
promoted to a library. The library contains validated content and is presented strictly
according to conventions. The content of the library is the trusted reference.
Write access to the library is strictly controlled to prevent accidental or uncontrolled
modification of the applications library.
Last recommendations
Deliver services
It is important to stay focused on the business needs. When possible, adopt an agile
approach to allow rapid implementation and rapid adjustments to users and stake-holders
specific needs. Try to address immediate needs as much as possible, like the production of
reports to illustrate dependencies between applications supporting a specific process.
Facilitate learning
Allow a smooth and progressive adoption of the application inventory building process (it’s
a group learning exercise). Keep it easy; develop simple conventions, create a project space
where creativity is allowed and mistakes have no consequences, when collecting input from
subject matter experts, privilege focus on content instead of focus on layout or
presentation. When possible make the most of available collaborative software that allows
easy screen sharing and collaboration across the enterprise.
Enforce reference material
Applications inventory has to become referential, communicated, understood and used
across the enterprise. It can then be used with confidence for business analysis, planning,
design of future solutions.
To allow comparison and optimisation, when possible, describe applications with mapping
relations to readily available enterprise wide reference material like a common Application
domains model.
Unite with business processes
Applications support Business processes: It’s a good way to track applications’ fitness for
business purpose.
Frederick Halas is a SeniorConsultantatLeonardoConsulting(www.leonardo.com.au).Frederick
joinedLeonardoconsultingaftermore than15 years’experience insoftware development,related
methodologiesandenterprisearchitecturecapabilitydevelopment. He can be contactedat
f.halas@leonardo.com.au.

More Related Content

Viewers also liked (8)

O que pesquisar em erva-mate?
O que pesquisar em erva-mate?O que pesquisar em erva-mate?
O que pesquisar em erva-mate?
 
Tm forum application_framework_tam_12.5
Tm forum application_framework_tam_12.5Tm forum application_framework_tam_12.5
Tm forum application_framework_tam_12.5
 
Presentacion de la enfermedad del Sarampion
Presentacion de la enfermedad del SarampionPresentacion de la enfermedad del Sarampion
Presentacion de la enfermedad del Sarampion
 
Dendistry intro and brain
Dendistry intro and brainDendistry intro and brain
Dendistry intro and brain
 
Dendistry best main lesson
Dendistry best main lessonDendistry best main lesson
Dendistry best main lesson
 
Nietzsche
NietzscheNietzsche
Nietzsche
 
Dossier sur le géomarketing
Dossier sur le géomarketingDossier sur le géomarketing
Dossier sur le géomarketing
 
Proceso selección de personal ppt act 2
Proceso selección de personal ppt act 2Proceso selección de personal ppt act 2
Proceso selección de personal ppt act 2
 

More from Frederick Halas

Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?
Frederick Halas
 
Architecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_PlanningArchitecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_Planning
Frederick Halas
 
ArchitectureBaselineDesign
ArchitectureBaselineDesignArchitectureBaselineDesign
ArchitectureBaselineDesign
Frederick Halas
 

More from Frederick Halas (6)

Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?Enterprise transformation - What is transformed?
Enterprise transformation - What is transformed?
 
On the nature of the enterprise architecture capability
On the nature of the enterprise architecture capabilityOn the nature of the enterprise architecture capability
On the nature of the enterprise architecture capability
 
Capabiliy analysis helping Ice Age Business transformation
Capabiliy analysis helping Ice Age Business transformationCapabiliy analysis helping Ice Age Business transformation
Capabiliy analysis helping Ice Age Business transformation
 
ITStrategicPlan
ITStrategicPlanITStrategicPlan
ITStrategicPlan
 
Architecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_PlanningArchitecture_From_Baseline_To_Planning
Architecture_From_Baseline_To_Planning
 
ArchitectureBaselineDesign
ArchitectureBaselineDesignArchitectureBaselineDesign
ArchitectureBaselineDesign
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

IT inventorying is a business process

  • 1. Building an IT Applications inventory - return on experience Why inventory of IT applications is business critical? IT applications contribute to the support of business processes or to the support other applications, thanks to the execution of IT Software. Directly or indirectly, IT applications have one main purpose; supporting the business in the most efficient way. They can be considered as an enterprise’s asset. Either custom developed, or packaged, IT applications represent a cost; licenses, maintenance, customization, development, running fees etc… In a large organization, due to reorganization, acquisitions or lack of coordination, it is hard to keep track of which business processes are supported by which applications. A trusted IT applications inventory united with process descriptions is the necessary foundation to answer the following questions with fact-grounded confidence:  What are the applications which support the most critical processes and which require attention and investment?  Are there applications which are barely or not used and for which recurring fees occur?  Is it possible to reduce costs by using one application instead of many applications for the same business purpose?  By virtue of the dependencies between applications, is business continuity at risk in case of IT failure?
  • 2. Informationquality is key An outdated list of applications or many disparate sources of information about IT applications cannot be used as a solid reference; no business decisions can be taken on their basis. That’s why an inventory of applications needs to be maintained centrally. Moreover, in order to allow the level of analysis required to answer business related questions, it is necessary to link the applications to business processes representations; a repository is required. An applications repository reaches an optimal level of quality when all necessary information is collected and signed-off. There are two main type of information that need to be recorded: Attributes They store the properties of applications, like unique enterprise wide Identifier, Name, Description, Responsibilities, Support responsibilities, assessment of Criticality which can be in the form of a tiered classification, current Operational status, indication of update strategy, number of users etc… Relationships Using a repository which integrates a database allows the documentation of relationships between applications and other representations. Relations allow impact analysis queries between Applications and the software products they use, the vendor providing them, the main functionalities they support, and eventually the processes they support. It is recommended to put in place a quality assurance mechanism that assesses the quality of application documentation for completeness of required attributes (semantic quality) and existence of relationships (syntactic quality). It should also include an assessment the validity of the recorded information. A pass score can be established to determine which applications descriptions are ready for sign-off and promotion to the library.
  • 3. Building the applications architecture is a process. Building an applications inventory is a process that transforms a heterogeneous, redundant and uncontrolled list of applications into a controlled catalogue placed under the responsibility of the subject matters experts. In order to reach the level of information quality required to allow trustworthy reference and reporting it is necessary to ensure that each application is identified, documented and signed off by the persons in charge of them within the enterprise. Application inventory, constituted by the applications, their attributes and relations to other objects, is structured content stored into a database. Yet, It is important to make sure that initial unstructured, incomplete or approximate content may be taken into account as an initial input. A modelling tool that allows collaboration and sharing of application architecture views can be used during discovery phases. Eventually, created application architecture views constitute the graphical communication of the application inventory content stored into the database. Once signed-off an application is ready to be placed under architecture control. It is promoted to a library. The library contains validated content and is presented strictly according to conventions. The content of the library is the trusted reference. Write access to the library is strictly controlled to prevent accidental or uncontrolled modification of the applications library.
  • 4. Last recommendations Deliver services It is important to stay focused on the business needs. When possible, adopt an agile approach to allow rapid implementation and rapid adjustments to users and stake-holders specific needs. Try to address immediate needs as much as possible, like the production of reports to illustrate dependencies between applications supporting a specific process. Facilitate learning Allow a smooth and progressive adoption of the application inventory building process (it’s a group learning exercise). Keep it easy; develop simple conventions, create a project space where creativity is allowed and mistakes have no consequences, when collecting input from subject matter experts, privilege focus on content instead of focus on layout or presentation. When possible make the most of available collaborative software that allows easy screen sharing and collaboration across the enterprise. Enforce reference material Applications inventory has to become referential, communicated, understood and used across the enterprise. It can then be used with confidence for business analysis, planning, design of future solutions. To allow comparison and optimisation, when possible, describe applications with mapping relations to readily available enterprise wide reference material like a common Application domains model. Unite with business processes Applications support Business processes: It’s a good way to track applications’ fitness for business purpose. Frederick Halas is a SeniorConsultantatLeonardoConsulting(www.leonardo.com.au).Frederick joinedLeonardoconsultingaftermore than15 years’experience insoftware development,related methodologiesandenterprisearchitecturecapabilitydevelopment. He can be contactedat f.halas@leonardo.com.au.