SlideShare a Scribd company logo
1 of 40
DHS OCIO/OCTO 1
Kevin A. Wince
Acting Chief Technology Officer
Executive Director for Enterprise Architecture
Office of the Chief Information Officer
Department of Homeland Security
Agile Enterprise Architecture &
Application Rationalization
Applying a business-focused, data-driven approach to
analyzing IT applications and visualizing EA data
DHS OCIO/OCTO 2
2
2
My Background
RNB
Technologies
Binary Group
Binary Group
DHS OCIO/OCTO 3
3
2
Levels of Architecture
Solution Architecture
Segment Architecture
Enterprise Architecture
Detail
Scope
DHS OCIO/OCTO 4
4
2
The Second Meaning of “Enterprise”
Enterprise
Business
Security
Data
Systems
Technology
Strategy
DHS OCIO/OCTO 5
5
● Model driven architecture
o Focuses on the visualization, not the data
● Create diagrams that often serve as a check in the box
o JCIDS
o FEAF
● Has value at the solution and segment level, hard to
derive value at the agency (enterprise) level
● Complex tools that few in the organization know or care
how to use
● Largely unchanged over the last 10-15 years
2
Traditional Enterprise Architecture
DHS OCIO/OCTO 6
6
● The primary purpose of an enterprise architecture (EA) -
support the decision making needs of the agency’s
business stakeholders
● A secondary purpose - support the decision making
needs of the technical stakeholders that directly
support the agency’s business stakeholders
● In order for any of this to be successful, accurate EA
data must be made readily available in a format which is
easily digestible and understandable by everyone
2
Why Do Enterprise Architecture?
Never identify the purpose of EA as compliance!
DHS OCIO/OCTO 7
7
● Agile means growth happens with small, iterative,
customer-centric steps that produce results quickly
● Agile EA is an approach to architecture development
that is focused on small EA deliverables with the needs
of the customer in mind
2
What is Agile EA?
Get visualizations/reports in front of the organization early, and
constantly ask for feedback.
DHS OCIO/OCTO 8
8
2
An Agile EA Organization
DHS OCIO/OCTO 9
9
1. EA should be useful for everyone
2. Business stakeholders are trusted partners who ultimately own
the data
3. Focus on the data, not the diagrams
4. Visualizing the EA data is key
5. Good architecture is about design intent
6. Reduce redundant data calls by reusing EA data
7. Single EA application
8. EA does not enforce, it informs
9. EA is never complete
10.Deliver business value quickly
Top 10 Agile EA Principles
DHS OCIO/OCTO 10
10
● EA widely unused across the Agency
● Little value
● Minimal relationship with the business
● Mainly a compliance function
● Multiple EA databases/tools, none were considered
authoritative
● Confusing
2
EA Landscape at GSA Upon Arrival
DHS OCIO/OCTO 11
11
● Go on a listening tour
o Understand business and technical issues and
frustrations
o Build partnerships
● Drive towards a single source (one repository) of the
truth
● Develop a data model that will continually evolve
o What data do people care about?
o What questions need to be answered?
2
First Steps for Success
DHS OCIO/OCTO 12
12
● The EA team should be viewed as the brain trust of the
organization - there to help others accomplish their
mission
● As the authoritative repository of information, the EA
must become the initial reference point for the budget
team, project managers, senior decision makers and
many others to use for their research and knowledge
sharing
2
Establish a Helpful EA
DHS OCIO/OCTO 13
13
● EA teams should have a good understanding of key
stakeholders across the enterprise to whom they provide data
● Attention should be focused on obtaining buy-in with the
definitions that impact EA (e.g., application, system, platform,
etc.)
o Stakeholders are better able to have meaningful
modernization discussions when a fundamental
understanding of key terms is obtained in advance
● It is important to continue building rapport by communicating
successes, providing interim status updates, and demonstrating
that there is progress being made
o Sharing EA data and results from initiatives builds credibility,
fosters communication, and enables change
2
Stakeholder Buy-in
DHS OCIO/OCTO 14
14
2
Establish Definitions (Example)
DHS OCIO/OCTO 15
15
● Need to have one location for all data that is recognized
as the authoritative location
● Data should be obtained from authoritative sources
where they exist
o Examples: FISMA data, CPIC data
o When authoritative data sources do not exist for
needed data, the EA repository should serve as that
location
2
A Single EA Application For Authoritative Data
DHS OCIO/OCTO 16
16
Methods of data collection/population:
1. Historical data calls (OMB, GAO, OIG, etc.)
2. Intranet sites
3. Organizational awareness (daily news feeds,
agency’s online media, emails, etc.)
4. Application rationalization
5. Network Scanning Software
6. Automated Feeds
7. Budget / Governance
2
Discovery – Populating the EA Repository
DHS OCIO/OCTO 17
17
2
What Does the EA Homepage Look Like?
Must be simple, clear and not overwhelm users.
DHS OCIO/OCTO 18
18
2
What Does an Organizational Report Look Like?
Depicts major bureaus, offices, etc. within an organization.
Must drill down to appropriate level of organization.
DHS OCIO/OCTO 19
19
2
What Does an Application Report Look Like?
Identifies the authoritative application list for the agency along
with some other key pieces of metadata.
DHS OCIO/OCTO 20
20
2
What Does an Application Roadmap Report Look Like?
Provides the 3-5 year roadmap strategy for IT modernization in the agency.
DHS OCIO/OCTO 21
21
2
What Does an IT Investment Report Look Like?
Identifies agency IT investments along with some other key pieces of metadata.
DHS OCIO/OCTO 22
22
2
What Does an IT Standards Report Look Like?
Identifies the authoritative list of technologies (software) that have been
approved and denied within the agency.
DHS OCIO/OCTO 23
23
2
What Does a FISMA System Report Look Like?
Identifies the authoritative list of FISMA Systems, POCs,
key dates, links to artifacts.
DHS OCIO/OCTO 24
24
2
Data Maintenance
● The EA team manages the architecture and how the
data is displayed; it is the responsibility of the data
owners, and the business and technical stakeholders, to
ensure the data is accurate.
o Business and Technical stakeholders - should be
granted access to maintain only their area of focus
and not the entire repository of data.
o Periodic reviews should be scheduled with
stakeholders
o Utilize existing resources - i.e. for POC data utilize
the global access list (GAL)
DHS OCIO/OCTO 25
25
2
Marketing – Getting the Word Out!
● Once the EA application is developed, it is critical to begin to market
it in as many ways as possible
o Newsletters, magazine articles, and agency intranet articles are
a few methods available to advertise what the agency EA
solution can do
o In those articles, simple use cases can be given as examples so
that anyone can see the benefit of EA
● It is also important to track metrics on the EA application to get
informed about usage.
o Number of unique users
o Number of sessions
o Statistics on the most popular sections of the EA website
o Use these to further promote the EA application by informing
senior leadership and others of the success
DHS OCIO/OCTO 26
26
Application Rationalization
DHS OCIO/OCTO 27
27
Application Rationalization Summary
Senior business leadership buy-in is critical!
● Application Rationalization - a methodology that provides
an organization a way to review a portfolio of applications
● Led by EA team – often no one in the owning
organization is familiar with entire portfolio of applications
● Identify applications to Tolerate, Invest in, Migrate and
Eliminate (TIME)
DHS OCIO/OCTO 28
28
Application Rationalization Accomplishments
Improved resource
allocation by reducing
redundancies and
inefficiencies
Engaged Business &
IT stakeholders
Defining 4-year
business-led strategic
application roadmaps
Data centralization
with fewer applications
Between Feb 2014 - June 2017, the Application Rationalization efforts have
resulted in the following:
265
Applications
Reviewed in
Portfolios
600+
Stakeholders
Engaged
Applications Eliminated
or to be eliminated in
FY16 - FY18
68 $12M+
Cost Avoidance
Identified
Increased Security by
reducing potential attack
surfaces
Increased End user
satisfaction by simplifying
the IT environment
DHS OCIO/OCTO 29
2
Phase Description
Phase 1 - Conduct
Baseline TIME
Analysis
Baseline application inventory
Plan sprints
Present applications and obtain governance approval for Phase 2
Phase 2 -
Conduct Detailed
Architecture
Analysis for
Selected
Applications
Conduct business and technical architecture
analysis as well as life-cycle cost analysis of
selected applications to:
● Detailed architecture analysis
● Evaluate existing technology solutions
● Data management, integration, and interoperability issues
● O&M cost reduction strategies
Present recommendation to governance
Two-Phased Approach
DHS OCIO/OCTO 30
30
Artifacts For Each Phase
2
Phase Artifacts
Phase 1 - Conduct
Baseline TIME Analysis
● Baselined application inventory
● Application Rationalization Project plan
including timelines and sprints
Phase 2 -
Conduct Detailed
Architecture Analysis
for Selected
Applications
● Questionnaires for each application
● Detailed brief with recommendations and
TIME data for each application within the
portfolio
● Authoritative application portfolio (displayed
on EA visualization solution) including
○ Strategic plan view
○ Business alignment view
○ Interface diagram
DHS OCIO/OCTO 31
31
● Baselined application inventory allows everyone to start with one common
understanding
● Sprints (e.g., ~15 apps for each 3 week sprint) provide the team the ability
to progress through the portfolio and demonstrate results
o Sprints should be grouped by common capability or enterprise
initiative, to the extent possible
● Buy-in from governance stakeholders and senior management is critical
before proceeding to Phase 2
2
Milestone Description
Baseline application
inventory
● Common understanding of applications
● Identified business and IT POCs
Sprints ● Identify sprint(s) to meet with and review
application portfolios
Phase 1 Overview
DHS OCIO/OCTO 32
32
Phase 1 Artifact: Baselined Application Inventory
● You may get different sources of truth (different count of apps, varying
app names, incomplete owners)
● At the end of Phase 1, there was ONE consolidated list that everyone
agreed to
● Should have application name, description, owning office, Business POC
and Technical POC.
?
DHS OCIO/OCTO 33
33
Acquisition Application Portfolio
...
Phase 1 Artifact: Planned Sprints
Focus of
Phase 2
Sprint 2
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name
Sprint 3
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name
Sprint 1
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name,
Application Name, Application Name, Application Name
● Sprints should be
planned to last no
longer than 3-4 weeks
● Plan to iterate through
sprints until the entire
portfolio is reviewed
● The team should plan
to provide status
updates to governance
boards and
management after
each sprint or two
DHS OCIO/OCTO 34
34
2
Phase 2 Overview
This is an iterative approach that is repeated for each sprint.
Milestone Description
Complete planning
activities
● Send emails
● Schedule meetings
● Distribute questionnaires
Complete meetings ● Conduct business and technical meetings
with IT & business owners
● Complete follow-up meetings (as necessary)
Complete analysis ● Assess business impact, technical
architecture, data migration plans
Brief governance
boards
● Brief observations, recommended 3-5 year
TIME strategy, opportunities for
improvement
DHS OCIO/OCTO 35
35
Phase 2 Artifact: Questionnaires
● General tab used to collect
general application data
● Business owner tab used to
collect Business-specific
information
● IT owner tab used to collect
IT-specific information
DHS OCIO/OCTO 36
36
● Below is an example snapshot of the applications
● Each application is placed in a TIME quadrant for the current 3-5 years
● Some applications may be TBD because more analysis or decisions need
to be made
2
Phase 2 Artifact: Application Roadmap Report
DHS OCIO/OCTO 37
37
Tolerate: There are three levels of tolerate:
• "T1" are considered in "keep the lights on” mode and only critical fixes are completed (i.e.,
resolve issues only if the application cannot be used at all or without major workarounds or for
significant security vulnerabilities). No DM&E. Only O&M
• "T2" are tolerated with enhancements. Mostly O&M with some DM&E
• "T3" are tolerated, are likely to be considered for migration in the next 1 to 3 years and a
migration plan is needed. Mostly O&M with DM&E for migration planning
Invest: Application is being developed/upgraded to provide functionality due to new business
requirement or elimination of current applications. Must have an approved EBC or 50% or more of
budget is DM&E. Applications will have implementation plans detailing the planned enhancements.
Migrate: There are two levels of migrate. Migration planning and funding to complete migration
should be approved so the migration can begin in the current fiscal year:
• "M1" are considered applications whose technology/platform/hardware are being modernized;
applications satisfy drivers to move to a new platform or technology. Technology focused.
• "M2" are considered applications whose capabilities are migrating to new solution; application
satisfy drivers including improved integration with other applications.
Technology/platform/hardware should be modernized as part of this migration. Business
focused (could include technology changes).
Eliminate: Application is no longer needed. Elimination date is known. Data migration plan is known.
TIME Definitions
DHS OCIO/OCTO 38
38
Phase 2 Artifact: Business Alignment View
2
● Business capabilities are used to define the services provided to the agency’s
customers
● The is an example representation of the applications aligned to the Customer
Services BRM
DHS OCIO/OCTO 39
39
Phase 2 Artifact: Interface Diagram
2
DHS OCIO/OCTO 40
Kevin A. Wince
Kevin.Wince@hq.dhs.gov

More Related Content

Similar to Agile Enterprise architecture.pptx

WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdfssuser590cc81
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT OrganizationCognizant
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingZero Wait-State
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architectubmedia
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceValue Amplify Consulting
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportPaul Woudstra
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...Dr. Haxel Consult
 
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docx
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docxMBA548-IT Management and InnovationReport 2Managing IS for Bus.docx
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docxalfredacavx97
 
MIS IT -architecture-presentation
MIS IT -architecture-presentationMIS IT -architecture-presentation
MIS IT -architecture-presentationChris Groves
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousingamooool2000
 
[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi
[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi
[DSC Europe 22] The Making of a Data Organization - Denys HolovatyiDataScienceConferenc1
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2amanuelayde1
 
Are project tracking tools helping or complicating Continuous Improvement Pro...
Are project tracking tools helping or complicating Continuous Improvement Pro...Are project tracking tools helping or complicating Continuous Improvement Pro...
Are project tracking tools helping or complicating Continuous Improvement Pro...Kubilay Balci
 
CEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCorporater
 
Data Playbook-October2020.pdf
Data Playbook-October2020.pdfData Playbook-October2020.pdf
Data Playbook-October2020.pdfIrfanAkbarKazi
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureGoutama Bachtiar
 

Similar to Agile Enterprise architecture.pptx (20)

WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdf
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization17 Must-Do's to Create a Product-Centric IT Organization
17 Must-Do's to Create a Product-Centric IT Organization
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial Manufacturing
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architect
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and Governance
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
 
Tw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_zTw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_z
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...
IC-SDV 2018: Srin Achanta (SciTech Patent Art) Global Competitive Technology ...
 
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docx
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docxMBA548-IT Management and InnovationReport 2Managing IS for Bus.docx
MBA548-IT Management and InnovationReport 2Managing IS for Bus.docx
 
MIS IT -architecture-presentation
MIS IT -architecture-presentationMIS IT -architecture-presentation
MIS IT -architecture-presentation
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi
[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi
[DSC Europe 22] The Making of a Data Organization - Denys Holovatyi
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2
 
Are project tracking tools helping or complicating Continuous Improvement Pro...
Are project tracking tools helping or complicating Continuous Improvement Pro...Are project tracking tools helping or complicating Continuous Improvement Pro...
Are project tracking tools helping or complicating Continuous Improvement Pro...
 
CEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architecture
 
Data Playbook-October2020.pdf
Data Playbook-October2020.pdfData Playbook-October2020.pdf
Data Playbook-October2020.pdf
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 

More from htdvul

CON 1300V Webinar Slides v1.pptx
CON 1300V Webinar Slides v1.pptxCON 1300V Webinar Slides v1.pptx
CON 1300V Webinar Slides v1.pptxhtdvul
 
PMOs Deliver Value.pdf
PMOs Deliver Value.pdfPMOs Deliver Value.pdf
PMOs Deliver Value.pdfhtdvul
 
asmjit - Complete x86 x64 JIT Assembler for C++.pdf
asmjit - Complete x86 x64 JIT Assembler for C++.pdfasmjit - Complete x86 x64 JIT Assembler for C++.pdf
asmjit - Complete x86 x64 JIT Assembler for C++.pdfhtdvul
 
SysInternals Disk2vhd - docs.pdf
SysInternals Disk2vhd - docs.pdfSysInternals Disk2vhd - docs.pdf
SysInternals Disk2vhd - docs.pdfhtdvul
 
Team drive get free storage
Team drive get free storageTeam drive get free storage
Team drive get free storagehtdvul
 
American civil war museum va
American civil war museum vaAmerican civil war museum va
American civil war museum vahtdvul
 
Ap08 compsci coursedesc
Ap08 compsci coursedescAp08 compsci coursedesc
Ap08 compsci coursedeschtdvul
 
Leadtools evaluation downloads
Leadtools evaluation downloadsLeadtools evaluation downloads
Leadtools evaluation downloadshtdvul
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemhtdvul
 
Linkedinmobile 111011223417-phpapp02
Linkedinmobile 111011223417-phpapp02Linkedinmobile 111011223417-phpapp02
Linkedinmobile 111011223417-phpapp02htdvul
 

More from htdvul (10)

CON 1300V Webinar Slides v1.pptx
CON 1300V Webinar Slides v1.pptxCON 1300V Webinar Slides v1.pptx
CON 1300V Webinar Slides v1.pptx
 
PMOs Deliver Value.pdf
PMOs Deliver Value.pdfPMOs Deliver Value.pdf
PMOs Deliver Value.pdf
 
asmjit - Complete x86 x64 JIT Assembler for C++.pdf
asmjit - Complete x86 x64 JIT Assembler for C++.pdfasmjit - Complete x86 x64 JIT Assembler for C++.pdf
asmjit - Complete x86 x64 JIT Assembler for C++.pdf
 
SysInternals Disk2vhd - docs.pdf
SysInternals Disk2vhd - docs.pdfSysInternals Disk2vhd - docs.pdf
SysInternals Disk2vhd - docs.pdf
 
Team drive get free storage
Team drive get free storageTeam drive get free storage
Team drive get free storage
 
American civil war museum va
American civil war museum vaAmerican civil war museum va
American civil war museum va
 
Ap08 compsci coursedesc
Ap08 compsci coursedescAp08 compsci coursedesc
Ap08 compsci coursedesc
 
Leadtools evaluation downloads
Leadtools evaluation downloadsLeadtools evaluation downloads
Leadtools evaluation downloads
 
Oscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystemOscon anatomy of_os_cloud_ecosystem
Oscon anatomy of_os_cloud_ecosystem
 
Linkedinmobile 111011223417-phpapp02
Linkedinmobile 111011223417-phpapp02Linkedinmobile 111011223417-phpapp02
Linkedinmobile 111011223417-phpapp02
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Agile Enterprise architecture.pptx

  • 1. DHS OCIO/OCTO 1 Kevin A. Wince Acting Chief Technology Officer Executive Director for Enterprise Architecture Office of the Chief Information Officer Department of Homeland Security Agile Enterprise Architecture & Application Rationalization Applying a business-focused, data-driven approach to analyzing IT applications and visualizing EA data
  • 2. DHS OCIO/OCTO 2 2 2 My Background RNB Technologies Binary Group Binary Group
  • 3. DHS OCIO/OCTO 3 3 2 Levels of Architecture Solution Architecture Segment Architecture Enterprise Architecture Detail Scope
  • 4. DHS OCIO/OCTO 4 4 2 The Second Meaning of “Enterprise” Enterprise Business Security Data Systems Technology Strategy
  • 5. DHS OCIO/OCTO 5 5 ● Model driven architecture o Focuses on the visualization, not the data ● Create diagrams that often serve as a check in the box o JCIDS o FEAF ● Has value at the solution and segment level, hard to derive value at the agency (enterprise) level ● Complex tools that few in the organization know or care how to use ● Largely unchanged over the last 10-15 years 2 Traditional Enterprise Architecture
  • 6. DHS OCIO/OCTO 6 6 ● The primary purpose of an enterprise architecture (EA) - support the decision making needs of the agency’s business stakeholders ● A secondary purpose - support the decision making needs of the technical stakeholders that directly support the agency’s business stakeholders ● In order for any of this to be successful, accurate EA data must be made readily available in a format which is easily digestible and understandable by everyone 2 Why Do Enterprise Architecture? Never identify the purpose of EA as compliance!
  • 7. DHS OCIO/OCTO 7 7 ● Agile means growth happens with small, iterative, customer-centric steps that produce results quickly ● Agile EA is an approach to architecture development that is focused on small EA deliverables with the needs of the customer in mind 2 What is Agile EA? Get visualizations/reports in front of the organization early, and constantly ask for feedback.
  • 8. DHS OCIO/OCTO 8 8 2 An Agile EA Organization
  • 9. DHS OCIO/OCTO 9 9 1. EA should be useful for everyone 2. Business stakeholders are trusted partners who ultimately own the data 3. Focus on the data, not the diagrams 4. Visualizing the EA data is key 5. Good architecture is about design intent 6. Reduce redundant data calls by reusing EA data 7. Single EA application 8. EA does not enforce, it informs 9. EA is never complete 10.Deliver business value quickly Top 10 Agile EA Principles
  • 10. DHS OCIO/OCTO 10 10 ● EA widely unused across the Agency ● Little value ● Minimal relationship with the business ● Mainly a compliance function ● Multiple EA databases/tools, none were considered authoritative ● Confusing 2 EA Landscape at GSA Upon Arrival
  • 11. DHS OCIO/OCTO 11 11 ● Go on a listening tour o Understand business and technical issues and frustrations o Build partnerships ● Drive towards a single source (one repository) of the truth ● Develop a data model that will continually evolve o What data do people care about? o What questions need to be answered? 2 First Steps for Success
  • 12. DHS OCIO/OCTO 12 12 ● The EA team should be viewed as the brain trust of the organization - there to help others accomplish their mission ● As the authoritative repository of information, the EA must become the initial reference point for the budget team, project managers, senior decision makers and many others to use for their research and knowledge sharing 2 Establish a Helpful EA
  • 13. DHS OCIO/OCTO 13 13 ● EA teams should have a good understanding of key stakeholders across the enterprise to whom they provide data ● Attention should be focused on obtaining buy-in with the definitions that impact EA (e.g., application, system, platform, etc.) o Stakeholders are better able to have meaningful modernization discussions when a fundamental understanding of key terms is obtained in advance ● It is important to continue building rapport by communicating successes, providing interim status updates, and demonstrating that there is progress being made o Sharing EA data and results from initiatives builds credibility, fosters communication, and enables change 2 Stakeholder Buy-in
  • 14. DHS OCIO/OCTO 14 14 2 Establish Definitions (Example)
  • 15. DHS OCIO/OCTO 15 15 ● Need to have one location for all data that is recognized as the authoritative location ● Data should be obtained from authoritative sources where they exist o Examples: FISMA data, CPIC data o When authoritative data sources do not exist for needed data, the EA repository should serve as that location 2 A Single EA Application For Authoritative Data
  • 16. DHS OCIO/OCTO 16 16 Methods of data collection/population: 1. Historical data calls (OMB, GAO, OIG, etc.) 2. Intranet sites 3. Organizational awareness (daily news feeds, agency’s online media, emails, etc.) 4. Application rationalization 5. Network Scanning Software 6. Automated Feeds 7. Budget / Governance 2 Discovery – Populating the EA Repository
  • 17. DHS OCIO/OCTO 17 17 2 What Does the EA Homepage Look Like? Must be simple, clear and not overwhelm users.
  • 18. DHS OCIO/OCTO 18 18 2 What Does an Organizational Report Look Like? Depicts major bureaus, offices, etc. within an organization. Must drill down to appropriate level of organization.
  • 19. DHS OCIO/OCTO 19 19 2 What Does an Application Report Look Like? Identifies the authoritative application list for the agency along with some other key pieces of metadata.
  • 20. DHS OCIO/OCTO 20 20 2 What Does an Application Roadmap Report Look Like? Provides the 3-5 year roadmap strategy for IT modernization in the agency.
  • 21. DHS OCIO/OCTO 21 21 2 What Does an IT Investment Report Look Like? Identifies agency IT investments along with some other key pieces of metadata.
  • 22. DHS OCIO/OCTO 22 22 2 What Does an IT Standards Report Look Like? Identifies the authoritative list of technologies (software) that have been approved and denied within the agency.
  • 23. DHS OCIO/OCTO 23 23 2 What Does a FISMA System Report Look Like? Identifies the authoritative list of FISMA Systems, POCs, key dates, links to artifacts.
  • 24. DHS OCIO/OCTO 24 24 2 Data Maintenance ● The EA team manages the architecture and how the data is displayed; it is the responsibility of the data owners, and the business and technical stakeholders, to ensure the data is accurate. o Business and Technical stakeholders - should be granted access to maintain only their area of focus and not the entire repository of data. o Periodic reviews should be scheduled with stakeholders o Utilize existing resources - i.e. for POC data utilize the global access list (GAL)
  • 25. DHS OCIO/OCTO 25 25 2 Marketing – Getting the Word Out! ● Once the EA application is developed, it is critical to begin to market it in as many ways as possible o Newsletters, magazine articles, and agency intranet articles are a few methods available to advertise what the agency EA solution can do o In those articles, simple use cases can be given as examples so that anyone can see the benefit of EA ● It is also important to track metrics on the EA application to get informed about usage. o Number of unique users o Number of sessions o Statistics on the most popular sections of the EA website o Use these to further promote the EA application by informing senior leadership and others of the success
  • 27. DHS OCIO/OCTO 27 27 Application Rationalization Summary Senior business leadership buy-in is critical! ● Application Rationalization - a methodology that provides an organization a way to review a portfolio of applications ● Led by EA team – often no one in the owning organization is familiar with entire portfolio of applications ● Identify applications to Tolerate, Invest in, Migrate and Eliminate (TIME)
  • 28. DHS OCIO/OCTO 28 28 Application Rationalization Accomplishments Improved resource allocation by reducing redundancies and inefficiencies Engaged Business & IT stakeholders Defining 4-year business-led strategic application roadmaps Data centralization with fewer applications Between Feb 2014 - June 2017, the Application Rationalization efforts have resulted in the following: 265 Applications Reviewed in Portfolios 600+ Stakeholders Engaged Applications Eliminated or to be eliminated in FY16 - FY18 68 $12M+ Cost Avoidance Identified Increased Security by reducing potential attack surfaces Increased End user satisfaction by simplifying the IT environment
  • 29. DHS OCIO/OCTO 29 2 Phase Description Phase 1 - Conduct Baseline TIME Analysis Baseline application inventory Plan sprints Present applications and obtain governance approval for Phase 2 Phase 2 - Conduct Detailed Architecture Analysis for Selected Applications Conduct business and technical architecture analysis as well as life-cycle cost analysis of selected applications to: ● Detailed architecture analysis ● Evaluate existing technology solutions ● Data management, integration, and interoperability issues ● O&M cost reduction strategies Present recommendation to governance Two-Phased Approach
  • 30. DHS OCIO/OCTO 30 30 Artifacts For Each Phase 2 Phase Artifacts Phase 1 - Conduct Baseline TIME Analysis ● Baselined application inventory ● Application Rationalization Project plan including timelines and sprints Phase 2 - Conduct Detailed Architecture Analysis for Selected Applications ● Questionnaires for each application ● Detailed brief with recommendations and TIME data for each application within the portfolio ● Authoritative application portfolio (displayed on EA visualization solution) including ○ Strategic plan view ○ Business alignment view ○ Interface diagram
  • 31. DHS OCIO/OCTO 31 31 ● Baselined application inventory allows everyone to start with one common understanding ● Sprints (e.g., ~15 apps for each 3 week sprint) provide the team the ability to progress through the portfolio and demonstrate results o Sprints should be grouped by common capability or enterprise initiative, to the extent possible ● Buy-in from governance stakeholders and senior management is critical before proceeding to Phase 2 2 Milestone Description Baseline application inventory ● Common understanding of applications ● Identified business and IT POCs Sprints ● Identify sprint(s) to meet with and review application portfolios Phase 1 Overview
  • 32. DHS OCIO/OCTO 32 32 Phase 1 Artifact: Baselined Application Inventory ● You may get different sources of truth (different count of apps, varying app names, incomplete owners) ● At the end of Phase 1, there was ONE consolidated list that everyone agreed to ● Should have application name, description, owning office, Business POC and Technical POC. ?
  • 33. DHS OCIO/OCTO 33 33 Acquisition Application Portfolio ... Phase 1 Artifact: Planned Sprints Focus of Phase 2 Sprint 2 Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name Sprint 3 Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name Sprint 1 Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name, Application Name ● Sprints should be planned to last no longer than 3-4 weeks ● Plan to iterate through sprints until the entire portfolio is reviewed ● The team should plan to provide status updates to governance boards and management after each sprint or two
  • 34. DHS OCIO/OCTO 34 34 2 Phase 2 Overview This is an iterative approach that is repeated for each sprint. Milestone Description Complete planning activities ● Send emails ● Schedule meetings ● Distribute questionnaires Complete meetings ● Conduct business and technical meetings with IT & business owners ● Complete follow-up meetings (as necessary) Complete analysis ● Assess business impact, technical architecture, data migration plans Brief governance boards ● Brief observations, recommended 3-5 year TIME strategy, opportunities for improvement
  • 35. DHS OCIO/OCTO 35 35 Phase 2 Artifact: Questionnaires ● General tab used to collect general application data ● Business owner tab used to collect Business-specific information ● IT owner tab used to collect IT-specific information
  • 36. DHS OCIO/OCTO 36 36 ● Below is an example snapshot of the applications ● Each application is placed in a TIME quadrant for the current 3-5 years ● Some applications may be TBD because more analysis or decisions need to be made 2 Phase 2 Artifact: Application Roadmap Report
  • 37. DHS OCIO/OCTO 37 37 Tolerate: There are three levels of tolerate: • "T1" are considered in "keep the lights on” mode and only critical fixes are completed (i.e., resolve issues only if the application cannot be used at all or without major workarounds or for significant security vulnerabilities). No DM&E. Only O&M • "T2" are tolerated with enhancements. Mostly O&M with some DM&E • "T3" are tolerated, are likely to be considered for migration in the next 1 to 3 years and a migration plan is needed. Mostly O&M with DM&E for migration planning Invest: Application is being developed/upgraded to provide functionality due to new business requirement or elimination of current applications. Must have an approved EBC or 50% or more of budget is DM&E. Applications will have implementation plans detailing the planned enhancements. Migrate: There are two levels of migrate. Migration planning and funding to complete migration should be approved so the migration can begin in the current fiscal year: • "M1" are considered applications whose technology/platform/hardware are being modernized; applications satisfy drivers to move to a new platform or technology. Technology focused. • "M2" are considered applications whose capabilities are migrating to new solution; application satisfy drivers including improved integration with other applications. Technology/platform/hardware should be modernized as part of this migration. Business focused (could include technology changes). Eliminate: Application is no longer needed. Elimination date is known. Data migration plan is known. TIME Definitions
  • 38. DHS OCIO/OCTO 38 38 Phase 2 Artifact: Business Alignment View 2 ● Business capabilities are used to define the services provided to the agency’s customers ● The is an example representation of the applications aligned to the Customer Services BRM
  • 39. DHS OCIO/OCTO 39 39 Phase 2 Artifact: Interface Diagram 2
  • 40. DHS OCIO/OCTO 40 Kevin A. Wince Kevin.Wince@hq.dhs.gov