Digital Transformation (Implications for the CXO)Anant Desai
Digital transformation refers to the organizational change that occurs through the use of digital technologies and business models to improve the organizational performance.
Application Management Service OfferingsGss America
GSS America extends support for Application Development and Maintenance initiatives and helps customers focus on their strategic priorities. The cost effective AMS solutions from GSS ensures that customers achieve significant savings on running their business operations, so that they can channel these savings towards new product development initiatives that contribute to additional revenue generation.
This is our IT Essentials for Startups workshop that we give at SCORE Counselors to America’s Small Business, Washington DC’s Chapter. This presentation covers the spectrum of IT basics for new or established small business owners.
ARIS World: Shaping the Future of ARIS 9 - All You Need to Know About the Upc...Software AG
Innovation World 2013 session.
Discover and shape the future of ARIS. Learn best practices from first Process Live (ARIS in the cloud) customers. Discuss the latest process improvement trends and how they impact your daily job.
Speakers:
Georg Simon
SVP, Product Marketing, Software AG
Joerg Klueckmann
Director, Product Marketing, Software AG
Fabian Erbach
Partner at Litmus Group Singapore
Digital Transformation (Implications for the CXO)Anant Desai
Digital transformation refers to the organizational change that occurs through the use of digital technologies and business models to improve the organizational performance.
Application Management Service OfferingsGss America
GSS America extends support for Application Development and Maintenance initiatives and helps customers focus on their strategic priorities. The cost effective AMS solutions from GSS ensures that customers achieve significant savings on running their business operations, so that they can channel these savings towards new product development initiatives that contribute to additional revenue generation.
This is our IT Essentials for Startups workshop that we give at SCORE Counselors to America’s Small Business, Washington DC’s Chapter. This presentation covers the spectrum of IT basics for new or established small business owners.
ARIS World: Shaping the Future of ARIS 9 - All You Need to Know About the Upc...Software AG
Innovation World 2013 session.
Discover and shape the future of ARIS. Learn best practices from first Process Live (ARIS in the cloud) customers. Discuss the latest process improvement trends and how they impact your daily job.
Speakers:
Georg Simon
SVP, Product Marketing, Software AG
Joerg Klueckmann
Director, Product Marketing, Software AG
Fabian Erbach
Partner at Litmus Group Singapore
Effective Application Portfolio Management using ArchiMateCorso
Learn how innovative organizations can manage and optimize the application portfolio, releasing time and costs for more strategic and valuable programs.
Take a high-level look into:
• Understanding the cost of your IT estate
• Analyzing the impact of change to an application in your portfolio
• Visualizing application and technology roadmaps for future decision making
• Identify overlaps and gaps in IT capabilities
Next Gen ADM: The future of application services.IBM
Rapid technology advances are driving higher expectations around speed, efficiency and resilience. Expectations for how technology should help meet business goals are rising. To meet increasing expectations around agility, time to value and cost optimization, Businesses are seeking new ways to manage apps. Born-digital companies are setting new standards for speed, efficiency and resilience. We will discuss how companies can optimize the core, unlock legacy and unleash digital to thrive in the new normal.
PTC Acquires Leading Internet of Things Platform Provider ThingWorxPTC
PTC (Nasdaq: PTC) today announced it has acquired ThingWorx, creators of an award-winning platform for building and running applications for the Internet of Things (IoT), for approximately $112 million, plus a possible earn-out of up to $18 million. The acquisition of ThingWorx positions PTC as a major player in the emerging Internet of Things era.
Leveraging Validation Lifecycle Data to Drive Actionable Business InsightsTasktop
In this on-demand webinar, Tasktop Sr. Value Stream Architect, Dan Feminella, Tx3 Services Co-founder and CRO, Eric Toburen, and Merck & Co. Test Tool Specialist, Petr Srajb, present n how organizations can start making data-driven decisions while maintaining compliance and traceability by:
- Automating the flow of Computer Systems Validation (CSV) Lifecycle data to eliminate duplicate entry and boost productivity.
- Providing real-time visibility into the health of your product value streams to see how business value is flowing—not just work
- Generating Flow Metrics to spot bottlenecks and identify opportunities where investment is needed to maximize business results.
Pocket HCM is a complete Cloud based HCM Solution with best in class security for data protection. Pocket HCM is a complete end to end HR management software in India. With offices based in Mumbai, Delhi, Gurgaon and Bangalore, the team offers productivity and low costs.
From 'Hire to Retire', Pocket HCM gives complete workflow on Cloud. With Self Service Module, employees can access on the go from anywhere and any device to update their vital information or apply and approve leaves. Declaration proofs can also be uploaded into the system directly.
SMS SAGE to 56767 to know more
Join CIGNEX Datamatics, Alfresco's Global Platinum Partner, as they share the case study experience of a leading supplier of auto parts, regarding their implementation of Alfresco as a Contract Lifecycle Management solution. The webinar will feature information related to the business drivers, challenges and solution architecture and also include a live demonstration.
JDA Software announces a new solution that converges best-of-breed supply chain excellence across all segments and verticals, all in the cloud! http://jda.com/fbeight
Coupa Crank Up the savings roadshow presentation. See how your company can save by using innovative on demand spend management software. Presentation from analyst Jason Busch
NetSuite OpenAir is the world’s #1 professional services automation (PSA) solution. From resource
management and project management, to time and expense tracking, project accounting and
advanced billing and invoicing, NetSuite OpenAir supports the entire professional services delivery
lifecycle with a powerful Software-as-a-Services (SaaS) suite.
How to Make Wise Post-Production Changes to Oracle Clinical/Remote Data Captu...Perficient, Inc.
It is not uncommon to make changes to a study after subjects have enrolled. If you use Oracle Clinical/Remote Data Capture (OC/RDC) to manage your clinical data, then you know that making those changes can be quite easy. However, even the simplest change could result in unforeseen consequences with the potential to undermine your study. That’s why it’s critical to perform a thorough risk analysis before making any changes.
In this webinar, Perficient’s Tammy Dutkin, director of clinical data management and EDC, discussed the process of evaluating and executing post-production changes in OC/RDC.
Next Gen ADM: The future of application services. IBM
Rapid technology advances are driving higher expectations around speed, efficiency and resilience. Expectations for how technology should help meet business goals are rising. To meet increasing expectations around agility, time to value and cost optimization, Businesses are seeking new ways to manage apps. Born-digital companies are setting new standards for speed, efficiency and resilience. We will discuss how companies can optimize the core, unlock legacy and unleash digital to thrive in the new normal.
Enterprise Capacity Optimization - Capacity Management Over EverythingTeamQuest Corporation
Traditional performance analysis and capacity planning encompassed deep-dive, technology domain-specific metrics, tools and skillsets; limiting feasibility to only the largest, most critical enterprise resources. Optimizing today’s complex and dynamic environments with almost all resources dynamic and virtualized or cloud-based - requires a new process. Discover a flexible, automated and business service-aligned process. View real-world examples of businesses optimizing enterprise capacity by marrying existing technology, business, service, asset, financial, power and other metrics. This presentation was delivered at the Gartner IT Infrastructure & Operations Management Summit.
Effective Application Portfolio Management using ArchiMateCorso
Learn how innovative organizations can manage and optimize the application portfolio, releasing time and costs for more strategic and valuable programs.
Take a high-level look into:
• Understanding the cost of your IT estate
• Analyzing the impact of change to an application in your portfolio
• Visualizing application and technology roadmaps for future decision making
• Identify overlaps and gaps in IT capabilities
Next Gen ADM: The future of application services.IBM
Rapid technology advances are driving higher expectations around speed, efficiency and resilience. Expectations for how technology should help meet business goals are rising. To meet increasing expectations around agility, time to value and cost optimization, Businesses are seeking new ways to manage apps. Born-digital companies are setting new standards for speed, efficiency and resilience. We will discuss how companies can optimize the core, unlock legacy and unleash digital to thrive in the new normal.
PTC Acquires Leading Internet of Things Platform Provider ThingWorxPTC
PTC (Nasdaq: PTC) today announced it has acquired ThingWorx, creators of an award-winning platform for building and running applications for the Internet of Things (IoT), for approximately $112 million, plus a possible earn-out of up to $18 million. The acquisition of ThingWorx positions PTC as a major player in the emerging Internet of Things era.
Leveraging Validation Lifecycle Data to Drive Actionable Business InsightsTasktop
In this on-demand webinar, Tasktop Sr. Value Stream Architect, Dan Feminella, Tx3 Services Co-founder and CRO, Eric Toburen, and Merck & Co. Test Tool Specialist, Petr Srajb, present n how organizations can start making data-driven decisions while maintaining compliance and traceability by:
- Automating the flow of Computer Systems Validation (CSV) Lifecycle data to eliminate duplicate entry and boost productivity.
- Providing real-time visibility into the health of your product value streams to see how business value is flowing—not just work
- Generating Flow Metrics to spot bottlenecks and identify opportunities where investment is needed to maximize business results.
Pocket HCM is a complete Cloud based HCM Solution with best in class security for data protection. Pocket HCM is a complete end to end HR management software in India. With offices based in Mumbai, Delhi, Gurgaon and Bangalore, the team offers productivity and low costs.
From 'Hire to Retire', Pocket HCM gives complete workflow on Cloud. With Self Service Module, employees can access on the go from anywhere and any device to update their vital information or apply and approve leaves. Declaration proofs can also be uploaded into the system directly.
SMS SAGE to 56767 to know more
Join CIGNEX Datamatics, Alfresco's Global Platinum Partner, as they share the case study experience of a leading supplier of auto parts, regarding their implementation of Alfresco as a Contract Lifecycle Management solution. The webinar will feature information related to the business drivers, challenges and solution architecture and also include a live demonstration.
JDA Software announces a new solution that converges best-of-breed supply chain excellence across all segments and verticals, all in the cloud! http://jda.com/fbeight
Coupa Crank Up the savings roadshow presentation. See how your company can save by using innovative on demand spend management software. Presentation from analyst Jason Busch
NetSuite OpenAir is the world’s #1 professional services automation (PSA) solution. From resource
management and project management, to time and expense tracking, project accounting and
advanced billing and invoicing, NetSuite OpenAir supports the entire professional services delivery
lifecycle with a powerful Software-as-a-Services (SaaS) suite.
How to Make Wise Post-Production Changes to Oracle Clinical/Remote Data Captu...Perficient, Inc.
It is not uncommon to make changes to a study after subjects have enrolled. If you use Oracle Clinical/Remote Data Capture (OC/RDC) to manage your clinical data, then you know that making those changes can be quite easy. However, even the simplest change could result in unforeseen consequences with the potential to undermine your study. That’s why it’s critical to perform a thorough risk analysis before making any changes.
In this webinar, Perficient’s Tammy Dutkin, director of clinical data management and EDC, discussed the process of evaluating and executing post-production changes in OC/RDC.
Next Gen ADM: The future of application services. IBM
Rapid technology advances are driving higher expectations around speed, efficiency and resilience. Expectations for how technology should help meet business goals are rising. To meet increasing expectations around agility, time to value and cost optimization, Businesses are seeking new ways to manage apps. Born-digital companies are setting new standards for speed, efficiency and resilience. We will discuss how companies can optimize the core, unlock legacy and unleash digital to thrive in the new normal.
Enterprise Capacity Optimization - Capacity Management Over EverythingTeamQuest Corporation
Traditional performance analysis and capacity planning encompassed deep-dive, technology domain-specific metrics, tools and skillsets; limiting feasibility to only the largest, most critical enterprise resources. Optimizing today’s complex and dynamic environments with almost all resources dynamic and virtualized or cloud-based - requires a new process. Discover a flexible, automated and business service-aligned process. View real-world examples of businesses optimizing enterprise capacity by marrying existing technology, business, service, asset, financial, power and other metrics. This presentation was delivered at the Gartner IT Infrastructure & Operations Management Summit.
Critical steps in Determining Your Value Stream Management SolutionDevOps.com
In order to increase your delivery velocity, you must find, identify and solve the bottlenecks of delivery. Value Stream management solutions capture metrics and processes helping guide your digital transformation journey.
Join Marc Hornbeek, Principal Consultant and Jeff Keyes from Plutora where they will discuss a methodology determining a value stream management solution for your organization. It will consist of critical steps including a Review of VSM Assessments, Future-State Value Stream Mapping, Road-Mapping VSM Transformation, and more. Following these steps provide a logical and comprehensive approach to determine a value stream management solution that fits for your organization’s requirements.
What will be learned:
WHY – is following steps for determining a VSM solution important?
HOW – are VSM solutions determined?
WHAT – is the expected outcome of a Value Stream Management solution recommendation?
Turning your Excel Business Process Workflows into an Automated Business Inte...OAUGNJ
Many organizations have evolved key internal business processes built on top of Microsoft Excel. These cross-functional workflows involve several organizational units responsible for collecting business system transactions, modifying this raw data, consolidating, transforming, pivoting and preparing data into a published set of Reports & Graphs – all in MS Excel. Such workflows are a burden to organizations – not repeatable, costly, time-consuming, inflexible and hard to scale, and evolve to become more complex over time. Business critical processes such as financial analysis, operational analysis and revenue analysis are often supported this way. Attempting to replace such systems can be quite daunting and a barrier to replace. The goal of this session is to present an easy to understand methodology and use cases to demonstrate how to move from an operational workflow in Excel to truly automated Business Intelligence.
Want to learn more about Activity Based Costing or IT Delivery Services Transparency? Would you like to better communicate your Technology Services Catalog or articulate proper chargebacks to the Business Stakeholders?
The business demands Best-in-Class Solutions with a secure and reliable infrastructures with no downtime, and now the CIO can provide a portal view with comprehensive Business Unit Dashboards and custom Data Analytics reporting.
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
A CASE Lab Report - Project File on "ATM - Banking System"
The software to be designed will control a simulated automated teller machine
(ATM) having a magnetic stripe reader for reading an ATM card, a keyboard and
display for interaction with the customer, a slot for depositing envelopes, a
dispenser for cash (in multiples of $20), a printer for printing customer receipts, and
a key-operated switch to allow an operator to start or stop the machine. The ATM
will communicate with the bank's computer over an appropriate communication
link. (The software on the latter is not part of the requirements for this problem.)
Conig® v1.5 Converged Information GovernanceYalcin Gerek
CONIG® (Converged Information Governance) is a governance framework developed by TAC A.S. addressing information and related technologies. Its main focus is INFORMATION. CONIG® is based on models that are widely used for Information Technologies, Corporate Governance as well as Business Governance.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
3. Automated Legacy Portfolio Assessment 3
Abstract
This document is intended for use by HCL and its Business Partners. This document consists of
HCL approach for Four Steps Legacy Assessment Framework.
Legacy Assessment - Overview
Automated Legacy Assessment capabilities provide a 360 degree view analysis of business
function, technical function, operational cum cost of each functions. The framework is focused
on analyzing and understanding the current application portfolio and final recommendation
provides the business value with technical architectural fitness to deliver the future needs.
Legacy Assessment Framework
This 4 steps framework helps enterprises to get more value from their mainframes immediately. It helps
optimize and reduce costs, open them up for new experiences and user-centric applications. All this is
done in a non-disruptive manner, and without the need for full scale migration.
Discovery
Inventory
Analysis and
Data Collection
1
Digital
Documentation
HCL Tool Setup
2
Assessment
Prepare
Questionnaire
3
Recommentation
Develop
Recomentation
4
Finalize the
Scope
Generate Digital
Documentation
Score
Application on
Business and
Technical Value
1. Keep/AS-IS/
Retain
2. Retire/Replace
3. Re-Engineer/
Migrate
4. New
Development
HCL 4 Step Legacy Assessment Framework
Roadmap
Develop
Business Case
Implementation
Roadmap
Robust Legacy Assessment framework involves four steps and each step has its sub level
functions.
Discovery Phase
Digital Documentation Phase
Assessment
Recommendation
4. Automated Legacy Portfolio Assessment 4
DISCOVERY PHASE
Mainly the first step is to identify and catalogue the existing application and its definition.
Application Inventory is for collecting data of the current system
LEGACY ANALYZER
Legacy Analyzer (LA) : Automated Tool helps to modernize legacy application for digital and
hybrid cloud transformation.
Tool operates across multiple languages(Assembler, COBOL, PL1 and LDL) and environments
(Application Or Operating System) and parses different application component types, such as
source code, operating systems scripts, include files, screen maps, transactions, and messaging
system configuration data.
It produce visualize application’s internal structure and dependencies static code analysis
functionality.
Gives users the opportunity to select and configure their own analysis starting point and then
navigate across or drill down as dictated by the development, maintenance, or support task at
hand.
5. Automated Legacy Portfolio Assessment 5
DIGITAL DOCUMENTATION
Tool based Digital Documentation Repository enable comprehensive documentation and
dashboards for online, batch and business rule extraction, to facilitate sustenance of legacy
system.
ASSESSMENT
Our framework consists of the following models
1. Data collection model with process of Tool (by Legacy Analyzer) + Questionnaire based approach
2. Mathematical Scoring model for cross verifying business and technical value
3. Analytical model for providing recommendation.
6. Automated Legacy Portfolio Assessment 6
Business Value and Technical Value Assessment
In our framework, Business value and Technical value are rated based on their maturity level.
In each level, business & technical maturity is evaluated
Major components for Business Value
Business Value
Assessment
Business
Criticality
Functional
Value
Complexity
Major components for Technical Value
Technical Value Assessment
Operation Revision Transition
Functionality Performance Reliability Usability Maintainability Supportability Testability Portability Reusability
Inter
Operability
Mathematical Assessment Model, our scoring and assessment model evaluate the Business
Value and technical value.
AXi=∑ 𝑀𝑛
𝑘=0 Bk
AXi Business Value Score for ith
application
X axis for Business Value
Y axis for Technical Value
MBk Particular Business Value componets (Functional Value or Business Criticality or Complexity)
7. Automated Legacy Portfolio Assessment 7
For Ex:
Functional Value (FV) is one of the business value and consists of 5 questions
Each question has 3 statement values from 1 to 3, maximum is 3 and minimum is 1.
Functional Value scoring evaluation is average of
1
3
FV1 +
1
3
FV2 +
1
3
FV3 +
1
3
FV4 +
1
3
FV5
Result of Assessment
Based on our Collaborative, strategic summit approach, HCL analyze the business and technical
value of each application. The combination of the business value (BV) and the technical value(TV)
is then used to help inform the decision on what to do with the legacy system. strategic approach
that will scrap, remain, redevelop or replace applications.
1. Low TV and low BV: Running these systems will be expensive and the rate of return to the
business will be low.
Recommendation: scrapping these systems might be an alternative.
2. Low TV and high BV: The systems make an important business contribution and cannot be
scrapped. However, their low quality indicates that operational costs are high.
Recommendation: System transformation or replacement if a suitable system is available.
3. High TV and low BV: Means that the systems do not contribute much to the business but they are
on the other hand not very expensive to maintain.
Recommendation: It is not worth of replacing these systems. Keep AS-IS and continued as a
normal system maintenance mode.
4. High TV and high BV: These systems must be kept in operation but their high technical value
means that it is not necessary to invest in transformation or system replacement.
Recommendation: AS-IS or Normal system maintenance continued.
BUSINESS VALUE
Technical Value
High BV
and
Low TV
Low BV
and
Low TV
High BV
and
High TV
Low BV
and
High TV
8. Automated Legacy Portfolio Assessment 8
4-Step Assessment Approach
Automated Legacy Portfolio Assessment gives multi-dimensional view of all legacy existing
applications. An overall assessment and recommendation require a comprehensive approach
and knowledge about business strategies and future investments. Each application need to be
evaluated in different conditions. There could be several factors that influence how maintenance
and the future development of the application should be handled even though it is given high or
low ratings in the Assessment.
HCL introduced 4-Step assessment approach and it will acknowledge the business strategy and
future investments.
Step-1: Create the Inventory and define the scope
Step-2: Componentize the system (Functional/Technical) and create the automated digital
document and it evaluate technical value (80%) and business value (60%).
Step-3: Assessing each componentized application
Technical Value: 80% evaluation automated from DD tool and 20% is from questionnaire
approach.
Business Value: 60% evaluation automated from DD tool and 40% is from questionnaire
approach.
Step-4: Recommendation based on the portfolio assessment report.
9. Automated Legacy Portfolio Assessment 9
Assessment Deliverables
Legacy portfolio assessment provides various deliverables report
1. IT Roadmap: provides a detailed IT roadmap that discusses your business and IT environment and
provides in-depth research about the most appropriate IT modernization options. The roadmap
establishes a modernization path that takes into account business goals, resources, costs,
dependencies and competing projects.
2. Tool Based Digital Document: DD tool produce the componentized (Functional/Technical)
document and it have deep understanding of end-to-end application information, Business
Process information, Business Function decomposition, Application Flow, Program Flow, Job Flow,
Quick Data Analysis, Dead code report, Application Interface, CURD operation details and Metric
summary.
3. Assessment Recommendation: 4-Step Assessment Approach finds the technology architecture
aspect of application deployment and assesses the Business Value and Technical Value fitment,
Business risks, Technology risk and business utilization. Finnaly produce the recommendation
report
Total rewrite
Keep AS-IS
Modernization
Decommissioning, of Redundancies and duplication
Integration within Service Oriented Architectures
4. Modernization Strategy Document: This document accompanies the roadmap and supplies the
overall strategy for the transformation of your IT environment.
Assessment Benefits
legacy Portfolio Assessment Approach would provide the following benefits
Identify and address the application investment requirements
Helps to eliminate regional and redundant applications and develop strategies for selective
application restructuring, redesigning, retiring and redeployment
Ensure the investment in terms of business value and Technical Value
Ensures the proper prioritization of initiatives
Ensures the use of effective and common approaches across system
Implementing a higher degree of COTS solutions would have the following benefits
o Reduce the number of technologies
o Reduce the dependency on specialized resources