SlideShare a Scribd company logo
1 of 4
Download to read offline
58 59Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue
This article describes an emerging Information Business
Architecture that provides cable operators with business
risk analytics. The architecture was designed to improve the
business performance of enterprises and service providers.
Its risk concentration analysis framework offers the ability to
identify, quantify and compare vulnerabilities (risks) throughout
an organisation.
It identifies the materiality – that is, the actual cost to the
business – of operations and customer care issues. Then it
ranks them according to their potential impact on business
performance. This helps to prioritize and schedule risk
mitigation activities such as field services and truck rolls. As
such, it also provides a solution for managing enterprise-
wide tasks such as business process automation, problem
resolution, resource allocation and overall spending.
The architecture enables cable operators to measure risks in
terms of their financial or reputational impact. Outcomes of
implementing the architecture typically include:
l	 Improved customer experience;
l	 Reduced organisational risk;
l	 Reduced operational expense;
l	 Competitive advantages.
The need for information architectures
An Integrated Business Architecture provides an industry
agreed, service-oriented approach for rationalising operational
IT, processes and systems.
By using standard, reusable, generic blocks, businesses
gain the advantage of standardisation while still allowing
customisation where necessary. This, in turn, enables cable
operators (and other service providers) to significantly reduce
their operational costs and improve customer service and
business agility.
The TM Forum has published IT and process
architecture that embraces major IT industry
standards such as ITIL and TOGAF. The
Framework is a hierarchical catalogue of
the key business processes required to run
a service-focused business. (See sidebar
overleaf.)
Core business entities
To effectively serve their customers, cable
operators have developed and evolved a
number of definitions for core concepts such as locations,
addresses, individuals and organisations, products, services and
resources. Information Business Architectures were designed to
work in concert with and report on Core Business Entities.
These attributes represent a core set of objects. They have
strength through being clearly defined and reusable. Ideally,
they should be implemented once and then be accessed
via a core model. These objects are referred to as the Core
Business Entities in the information architecture.
Core Business Entities are the core set of things in which any
enterprise is interested. (See sidebars 2 and 3 on pages 47
and 49). They are typically responses to Who, What, Where,
Why and Why questions, as represented in Figure 1 below.
Who: “Who” is the Party or Party Role. This can be Customers,
Service Providers, Employees and other individuals and
organisations that interact with the business. During these
interactions, Parties play ‘Roles’ which have a number of
typical characteristics. These include attributes such as
Name, Address, Contact Medium etc. Parties are typically
tracked by the business during the lifecycle of their respective
interactions.
What: “What” is the Product, Service or Resource.
l	Products are typically customer-facing services or
resources. This includes Data, Telephony, High Speed
Data or even a broadcast event.
l	 In contrast, a Service is typically something provided either
to support a Product, or as a result of the Product. For
example, it could be “installation” services or “streaming”
service to delivery the broadcast event.
l	 Resources are part of an enterprise’s infrastructure and
are used by the Service. This includes the cable plant and
associated inventory.
Figure 1: Relationship of Who, What, Where, Why and When in a Core Business Entity.
By Myles Kennedy, Laurie Asperas and Evan Birkhead, Rev2 Networks
In this final entry of its three-part, back-office series, the Rev2 Networks’ team
describes an Information Business Architecture that enables efficient Cable TV
customer care and network operations. The first article explained how to track
the customer journey through intelligent analytics of End-to-End Customer
ticketing. The second explained how Event Processing Networks provide
efficient, real-time management of customer data.
Emerging Technologies:An Information Business Architecture that Enables Efficient
Cable Operations and Enhances Customer Experience
Myles is an internationally experienced
customer relationship consultant with
expertise in business analysis, service
design and transition, and operational
best practices.
Myles Kennedy,
Business
Development
& Product
Consultant
technicaltechnical
Laurie has worked in diverse industries
tracking strategy and technology
successfully through time. Navigating
different social groups, she connects
social needs and technologies. At
Rev2, her role is focused on expanding
the footprint of RiskView, the flagship
product.
Laurie Asperas,
Strategy Officer
Evan’s tech sector experience dates
back to his years in journalism when
he was news editor of LAN Computing
magazine (1990-94) and editor-in-chief
of Internetwork magazine (1994-97). He
has been in network industry marketing
ever since.
Evan Birkhead,
Business
Development
60 61Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue
This enables predictive analytics that identify problems before
they snowball out of control. By catching costly issues early in
their lifecycle, the system prevents the “death by a thousand
paper cuts” that is dreaded by CFOs.
Technical overview
The architecture is a highly extensible platform for fact-based,
scalable, repeatable business risk analytics and decision-
making. It actively mines, weighs and correlates inputs from
disparate heterogeneous data sources. At the heart of the
architecture is an analytical Risk Data Warehouse that is fed
by Data Source Adapters as shown in Figure 2 above.
The domain expertise designed into the Adapters for collection
and abstraction of data sources distinguishes the architecture
from generic business intelligence solutions. Collectively,
Adapters span the entire cable operator’s business. The net
result is a time-based snapshot of business performance.
A key differentiator of the architecture is its ability to identify the
business materiality of risks according to their potential impact
on business performance, which helps operators to prioritise
business processes, problem resolution and overall spending.
Additionally, the architecture’s unique ability to normalise
and correlate data across multiple data sources allows for a
quantitative comparison and measurement of different risks.
The architecture enables a materiality score to be assigned to
each risk across the operator’s service delivery infrastructure,
enabling material risks to stand out from the rest. After
collecting vulnerability data throughout the business, a score
is assigned to each “risklet” that reflects its likelihood to cause
What are entities?
A business entity is a thing of interest
to the business. Business entities are
characterised by attributes. Business
entities also possess other properties,
such as involvement in associations
with other business entities or entity
types and exhibition of behaviour.
These properties (attributes, associations
and behaviour) of business entities may
be inherited by the other entity types or
other business entities. A core business
entity represents five basic concepts
present in the day-to-day running of
every enterprise. The concepts are
who, what, where, when and why.
These business entities support
processes in the Product, Service
and Resource layers of the eTOM.
A core business entity may also be
a business entity that is common to
a number of eTOM processes, for
example Location and Address.
A core model contains the artifacts
that fully describe core business
entities. The artifacts include core
business entity definitions and UML
models. The UML models contain
class diagrams that document the
attributes and operations of the core
business entities.
Figure 2. Operations and care information architecture.
technicaltechnical
Where: “Where” is the physical or logical Location or Address.
Locations are typically an actual place, such as a building.
Addresses, on the other hand, are typically a means of finding a
location. As a result, multiple Addresses may point to one Location:
for example, the “third house on the left” is the same location as
#10 Long Street. “Where” entities are associated with a number of
other business entities, including Parties, Interactions, Resources,
Services, Products etc.
Why: “Why” is the reason or trigger for an interaction. An Interaction
is an activity between parties – such as a customer placing a VOD
order or the VOD order being played out (in this case, this would
be considered two interactions). Interactions commonly also involve
Products, Service, Locations, Resources etc. They can also take
the form of contracts or communications.
When: “When” is simply the timing of an interaction. A number
of core business entities, such as Party and Interaction, represent
abstract concepts. Specialised child subclasses are in turn defined
underneath them, and inherit the behaviours, attributes and
associations of the Core Business Entity.
The materiality score
A new Business Information Architecture, which implements
these concepts, is based on a unique technical capability - it can
normalise and correlate data from multiple data sources within the
Cable TV service delivery infrastructure. This enables operators to
quantitatively compare and measure different risks.
In Cable TV operations, the architecture clearly demonstrates
immediate value with its ability to import and correlate data from
multiple sources (such as telemetry, customer databases, service
reports, trouble tickets, network events etc.). Data correlation
enables it to pinpoint cross-departmental and enterprise-wide
infrastructure issues that are negatively impacting the customer
experience.
As mentioned, the architecture uses a unique scoring approach
that measures the “materiality” of events based on either actual
financial costs to the business or reputational costs, a formula
based upon events that adversely impact the customer experience.
The materiality score can highlight events that don’t meet typical
thresholds for identification or mitigation but that, in total, have
significant impact on the business.
The more data collected, the more accurate the score. Additionally,
the more data collected, the more likely the system is to detect
problems before they cross thresholds and are noticed by operators.
Information architectures in
the cable industry
A number of alternative information and data
models (and model fragments) are commonly
used in the Cable and Telecommunications
industry today. This includes efforts from fora such
as the International Telecommunications Union
(ITU); the Internet Engineering Task Force (IETF);
the Internet Protocol Detail Record Organisation
(iPDR.org); the TeleManagement Forum; the
Object Management Group (OMG); the DMTF
(Distributed Management Task Force); the T1M1
committee of the Alliance for Telecommunications
Industry Solutions (ATIS); the OSS through Java
Initiative (OSS/J) and others who have developed
models and model fragments.
These models form the basis of systems’
interoperability, but the sheer variety of available
models highlights the need for a standardised
information architecture to unite these industry
models.
The TeleManagement Forum’s Shared Information
and Data Modelling team (SID) is a core model
that represents one such effort. It has gained
acceptance within the communications and
information services industry. In particular, the
ITU/T1M1 use the SID as a source for its Global
Telecom Data Dictionary (GTDD) and the OMG’s
Telecom Domain Task Force configuration-
independent model is based on a SID foundation.
The SID is fundamentally an Information Model.
It is a representation of business concepts, their
characteristics and relationships, described in
an implementation-independent manner. It offers
an information reference model with a common
vocabulary that can be leveraged between
systems and businesses.
These entities are typically packaged and
documented via UML models. The presentation is
in the form of a layered framework that partitions
the shared information and data into eight high-
level domains. These domains are broadly aligned
with eTOM.
62 63Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue
l	 Identity / Party
(who)
l	 Individuals and
Organisations
l	 Customer (actual
or potential)
l	Supplier
l	User
l	 Time & Time
Period (when)
l	Calendar
l	 Places / Locations
(where)
l	 Locations and
Sites
l	Addresses
l	 Motivation (why)
l	 Business Planning
l	 Work (how)
l	 Plan and Project
l	Process
l	 Policy (how)
l	 The Business
(what)
l	 Agreement and
Contract
l	Product
l	Service
l	Resource
l	 Event (when)
l	 Financials (what)
decision-making. It runs as a VMware virtual machine and, as
such, requires minimal or no hardware infrastructure.
The domain expertise embedded in Adapters for collection and
abstraction of data sources is proprietary and distinguishes it
from generic business intelligence solutions.
The Adapters connect to data sources such as ticketing
systems (such as Remedy), billing systems, telemetry systems
(such as ARRIS ServAssure) and WFM systems (such as
ARRIS WorkAssure) etc. The data contains issues gathered
from customer support calls; premises and plant truck rolls;
telemetry; NOC alarms etc. The net result is a time-based
snapshot of business performance.
The data records are parsed, classified, weighted, stored,
correlated and later presented through a user interface or a
text file generated by the system.
The metrics imported into the architecture are scalable over
time. Since the Data Source Adapters are written in PERL,
Example entities
Figure 4. This is a typical report showing streets ranked according to their actual financial cost to operate over a 7-day period. The
key to colours and metrics is shown at the bottom of the screen, along with the mathematical definitions for Count, Financial Cost
and Reputational Cost. Conn Calls refers to the number of Customer Calls related to Connectivity.
technicaltechnical
a problem as well as the impact that this problem would
cause. The architecture was designed to address the reality
that the same risks have multiple impacts on the business.
Differentiators
The architecture distinguishes itself in several ways:
l	 It takes a typical risk conversation from a technical to
a business level, based upon the materiality of adverse
business outcomes.
l	 The analytics, while based upon standards, have been
extended to accommodate senior executives by including
impact values and classifications. These include the
aforementioned financial and reputational risks, as well as
analytics describing the geographic centre of issues and
organisational views.
l	 It considers both the raw score of each vulnerability and the
business role of the asset on which it exists. This mapping is
critical, since the same vulnerability on a desktop or on a server,
for example, might have a very different business impact.
l	 The visualisation engine, which employs a “radar chart”-
style user interface is innovative and allows users to quickly
isolate “outliers”. Outliers can be vulnerabilities that drive
disproportionate total risk, those with unusual profiles etc.
l	 The correlation engine allows multiple data sources to be
used to more thoroughly identify key drivers of risk, and
“normalises” data to allow quantitative comparisons of risk
across different tools.
Solution architecture
The architecture is a lightweight, highly extensible platform for
fact-based, scalable, repeatable business risk analytics and
Figure 3. Radar charts display the most material risks as the farthest from the centre. In this case, the chart shows material risks
according to various geographies.
64 65Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue
technicaltechnical
Rev2 Networks is a thought-leading Business Risk Analytics™
provider focused on delivering solutions that improve
business performance. Its patent-pending RiskView® Risk
Concentration Analysis™ framework offers the ability to
identify, compare and quantify vulnerabilities across the entire
enterprise before they impact business performance.
By correlating and weighting existing risk data from sources
throughout your infrastructure, the RiskView Business Risk
Analytics® solution identifies hidden issues that are costing
you the most money and causing your customers the most
pain – before they snowball out of control.
RiskView identifies the materiality of risks according to
their potential impact on business performance, helping
customers to prioritise and schedule business process
improvement, problem resolution and overall spending.
RiskView outcomes typically include reduced organisational
risk profile; reduced OpEx; improved customer experience
and competitive advantage.
they are extensible to rapidly support new data sources as
they become available. Real-world customers are importing
hundreds of gigabytes of data into the Data Warehouse.
In addition, the architecture has been extended to
automatically collect telemetry and workforce management
data and to automatically generate and open new tickets for
the field service team that rank issues according to materiality.
By enabling field service to address network issues before
they impact more customers, the architecture is saving
operational and support costs and improving overall customer
experience.
About Rev2 Networks

More Related Content

What's hot

Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWAlan D. Duncan
 
IT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessIT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessO' Neil Lim
 
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULES
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULESINTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULES
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULESijdms
 
Small and medium enterprise business solutions using data visualization
Small and medium enterprise business solutions using data visualizationSmall and medium enterprise business solutions using data visualization
Small and medium enterprise business solutions using data visualizationjournalBEEI
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements TemplateAlan D. Duncan
 
06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)Alan D. Duncan
 
Types of Information Technology Capabilities and Their Role in Competitive Ad...
Types of Information Technology Capabilities and Their Role in Competitive Ad...Types of Information Technology Capabilities and Their Role in Competitive Ad...
Types of Information Technology Capabilities and Their Role in Competitive Ad...Yung-Chun Chang
 
Tharaka phd presentation2010
Tharaka phd presentation2010Tharaka phd presentation2010
Tharaka phd presentation2010pajo01
 
Information Management Capabilities, Competencies & Staff Maturity Assessment
Information Management Capabilities, Competencies & Staff Maturity AssessmentInformation Management Capabilities, Competencies & Staff Maturity Assessment
Information Management Capabilities, Competencies & Staff Maturity AssessmentChristopher Bradley
 
Capturing Data Requirements
Capturing Data RequirementsCapturing Data Requirements
Capturing Data Requirementsmcomtraining
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsJulian Rains
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable ArchitectureJerald Burget
 
Tca best practices2
Tca best practices2Tca best practices2
Tca best practices2huynhducbi
 
Business case for concept models
Business case for concept modelsBusiness case for concept models
Business case for concept modelsCory Casanave
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federationCory Casanave
 
Delportvervestvanheck Emj April 2004
Delportvervestvanheck   Emj April 2004Delportvervestvanheck   Emj April 2004
Delportvervestvanheck Emj April 2004Eric van Heck
 

What's hot (19)

Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
 
IT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessIT Outsourcing: Job Embeddedness
IT Outsourcing: Job Embeddedness
 
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULES
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULESINTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULES
INTEGRATED FRAMEWORK TO MODEL DATA WITH BUSINESS PROCESS AND BUSINESS RULES
 
Small and medium enterprise business solutions using data visualization
Small and medium enterprise business solutions using data visualizationSmall and medium enterprise business solutions using data visualization
Small and medium enterprise business solutions using data visualization
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements Template
 
06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)06. Transformation Logic Template (Source to Target)
06. Transformation Logic Template (Source to Target)
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vis...
 
Types of Information Technology Capabilities and Their Role in Competitive Ad...
Types of Information Technology Capabilities and Their Role in Competitive Ad...Types of Information Technology Capabilities and Their Role in Competitive Ad...
Types of Information Technology Capabilities and Their Role in Competitive Ad...
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Tharaka phd presentation2010
Tharaka phd presentation2010Tharaka phd presentation2010
Tharaka phd presentation2010
 
Information Management Capabilities, Competencies & Staff Maturity Assessment
Information Management Capabilities, Competencies & Staff Maturity AssessmentInformation Management Capabilities, Competencies & Staff Maturity Assessment
Information Management Capabilities, Competencies & Staff Maturity Assessment
 
Capturing Data Requirements
Capturing Data RequirementsCapturing Data Requirements
Capturing Data Requirements
 
Using the LEADing Data Reference Content
Using the LEADing Data Reference ContentUsing the LEADing Data Reference Content
Using the LEADing Data Reference Content
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And Reports
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable Architecture
 
Tca best practices2
Tca best practices2Tca best practices2
Tca best practices2
 
Business case for concept models
Business case for concept modelsBusiness case for concept models
Business case for concept models
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federation
 
Delportvervestvanheck Emj April 2004
Delportvervestvanheck   Emj April 2004Delportvervestvanheck   Emj April 2004
Delportvervestvanheck Emj April 2004
 

Viewers also liked

CV_Ye Ni Soe_24 March 2015
CV_Ye Ni Soe_24 March 2015CV_Ye Ni Soe_24 March 2015
CV_Ye Ni Soe_24 March 2015Soe Ye Ni
 
Madhan Kumar-SAP(Change Request and Release Management)SOLMAN
Madhan Kumar-SAP(Change Request and Release Management)SOLMANMadhan Kumar-SAP(Change Request and Release Management)SOLMAN
Madhan Kumar-SAP(Change Request and Release Management)SOLMANMadhan Kumar
 
Resume Damian Lopez
Resume Damian LopezResume Damian Lopez
Resume Damian LopezDamian Lopez
 
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...Vera Leonik-Shilyaeva
 
パート1 つながるデータ編
パート1 つながるデータ編パート1 つながるデータ編
パート1 つながるデータ編s tanaka
 
PeopleSoft Employee Onboarding with Style (and no paper)
PeopleSoft Employee Onboarding with Style (and no paper)PeopleSoft Employee Onboarding with Style (and no paper)
PeopleSoft Employee Onboarding with Style (and no paper)Smart ERP Solutions, Inc.
 
Concur integration with PI solution pack
Concur integration with PI solution pack Concur integration with PI solution pack
Concur integration with PI solution pack SatyaSuman Lakkimsetty
 
Concur vs SAP on premise Travel Management
Concur vs SAP on premise Travel ManagementConcur vs SAP on premise Travel Management
Concur vs SAP on premise Travel ManagementSven Ringling
 

Viewers also liked (12)

CV_Ye Ni Soe_24 March 2015
CV_Ye Ni Soe_24 March 2015CV_Ye Ni Soe_24 March 2015
CV_Ye Ni Soe_24 March 2015
 
Madhan Kumar-SAP(Change Request and Release Management)SOLMAN
Madhan Kumar-SAP(Change Request and Release Management)SOLMANMadhan Kumar-SAP(Change Request and Release Management)SOLMAN
Madhan Kumar-SAP(Change Request and Release Management)SOLMAN
 
Resume Damian Lopez
Resume Damian LopezResume Damian Lopez
Resume Damian Lopez
 
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...
Preactor 12 (Brochure)_What`s New (APS-system/Advanced Planning and Schedulin...
 
Certificate
CertificateCertificate
Certificate
 
Resume
ResumeResume
Resume
 
パート1 つながるデータ編
パート1 つながるデータ編パート1 つながるデータ編
パート1 つながるデータ編
 
PeopleSoft Employee Onboarding with Style (and no paper)
PeopleSoft Employee Onboarding with Style (and no paper)PeopleSoft Employee Onboarding with Style (and no paper)
PeopleSoft Employee Onboarding with Style (and no paper)
 
Concur integration with PI solution pack
Concur integration with PI solution pack Concur integration with PI solution pack
Concur integration with PI solution pack
 
CV
CVCV
CV
 
Concur vs SAP on premise Travel Management
Concur vs SAP on premise Travel ManagementConcur vs SAP on premise Travel Management
Concur vs SAP on premise Travel Management
 
Sap hybris overview
Sap hybris overviewSap hybris overview
Sap hybris overview
 

Similar to Cable Information Architecture_SCTE_Nov14

Practice EA in three tiers
Practice EA in three tiersPractice EA in three tiers
Practice EA in three tiersJohn Wu
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft MimarisiNuri Cankaya
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architectubmedia
 
ICT in BUSINESS_071619_06185majesty2.pptx
ICT in BUSINESS_071619_06185majesty2.pptxICT in BUSINESS_071619_06185majesty2.pptx
ICT in BUSINESS_071619_06185majesty2.pptxanaba2926
 
ICT in BUSINESS_071619_061852 Business.pptx
ICT in BUSINESS_071619_061852 Business.pptxICT in BUSINESS_071619_061852 Business.pptx
ICT in BUSINESS_071619_061852 Business.pptxanaba2926
 
ICT in BUSINESS_07161736547. Businesspptx
ICT in BUSINESS_07161736547. BusinesspptxICT in BUSINESS_07161736547. Businesspptx
ICT in BUSINESS_07161736547. Businesspptxanaba2926
 
An Introduction to User-Centric EA - Andy Blumenthal
An Introduction to User-Centric EA - Andy BlumenthalAn Introduction to User-Centric EA - Andy Blumenthal
An Introduction to User-Centric EA - Andy BlumenthalAndy (Avraham) Blumenthal
 
Information security-integration-part-1-of-2
Information security-integration-part-1-of-2Information security-integration-part-1-of-2
Information security-integration-part-1-of-2wardell henley
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
Dashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and meDashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and meMary Chant
 
A Networked Perspective On Business Model For Sap Managed Services
A Networked Perspective On Business Model For Sap Managed ServicesA Networked Perspective On Business Model For Sap Managed Services
A Networked Perspective On Business Model For Sap Managed ServicesTodd Turner
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...ijbiss
 
Enterprise Representation An Analysis Of+Standards Issues
Enterprise Representation An Analysis Of+Standards IssuesEnterprise Representation An Analysis Of+Standards Issues
Enterprise Representation An Analysis Of+Standards Issueslegal2
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...Iver Band
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...ijbiss
 
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...ijbiss
 
The Role of Data Visualization in Business Decision-Making: A Review of Best ...
The Role of Data Visualization in Business Decision-Making: A Review of Best ...The Role of Data Visualization in Business Decision-Making: A Review of Best ...
The Role of Data Visualization in Business Decision-Making: A Review of Best ...IRJET Journal
 

Similar to Cable Information Architecture_SCTE_Nov14 (20)

Practice EA in three tiers
Practice EA in three tiersPractice EA in three tiers
Practice EA in three tiers
 
Zachman framework
Zachman frameworkZachman framework
Zachman framework
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architect
 
ICT in BUSINESS_071619_06185majesty2.pptx
ICT in BUSINESS_071619_06185majesty2.pptxICT in BUSINESS_071619_06185majesty2.pptx
ICT in BUSINESS_071619_06185majesty2.pptx
 
ICT in BUSINESS_071619_061852 Business.pptx
ICT in BUSINESS_071619_061852 Business.pptxICT in BUSINESS_071619_061852 Business.pptx
ICT in BUSINESS_071619_061852 Business.pptx
 
ICT in BUSINESS_07161736547. Businesspptx
ICT in BUSINESS_07161736547. BusinesspptxICT in BUSINESS_07161736547. Businesspptx
ICT in BUSINESS_07161736547. Businesspptx
 
Tw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_zTw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_z
 
An Introduction to User-Centric EA - Andy Blumenthal
An Introduction to User-Centric EA - Andy BlumenthalAn Introduction to User-Centric EA - Andy Blumenthal
An Introduction to User-Centric EA - Andy Blumenthal
 
Information security-integration-part-1-of-2
Information security-integration-part-1-of-2Information security-integration-part-1-of-2
Information security-integration-part-1-of-2
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Dashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and meDashboards Driving Decision Making - ui and me
Dashboards Driving Decision Making - ui and me
 
A Networked Perspective On Business Model For Sap Managed Services
A Networked Perspective On Business Model For Sap Managed ServicesA Networked Perspective On Business Model For Sap Managed Services
A Networked Perspective On Business Model For Sap Managed Services
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
 
Enterprise Representation An Analysis Of+Standards Issues
Enterprise Representation An Analysis Of+Standards IssuesEnterprise Representation An Analysis Of+Standards Issues
Enterprise Representation An Analysis Of+Standards Issues
 
The Development Of Cobit. Isaca
The Development Of Cobit. IsacaThe Development Of Cobit. Isaca
The Development Of Cobit. Isaca
 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...Visualizing IT at the Department of Homeland Security with the  ArchiMate® Vi...
Visualizing IT at the Department of Homeland Security with the ArchiMate® Vi...
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
 
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
 
The Role of Data Visualization in Business Decision-Making: A Review of Best ...
The Role of Data Visualization in Business Decision-Making: A Review of Best ...The Role of Data Visualization in Business Decision-Making: A Review of Best ...
The Role of Data Visualization in Business Decision-Making: A Review of Best ...
 

Cable Information Architecture_SCTE_Nov14

  • 1. 58 59Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue This article describes an emerging Information Business Architecture that provides cable operators with business risk analytics. The architecture was designed to improve the business performance of enterprises and service providers. Its risk concentration analysis framework offers the ability to identify, quantify and compare vulnerabilities (risks) throughout an organisation. It identifies the materiality – that is, the actual cost to the business – of operations and customer care issues. Then it ranks them according to their potential impact on business performance. This helps to prioritize and schedule risk mitigation activities such as field services and truck rolls. As such, it also provides a solution for managing enterprise- wide tasks such as business process automation, problem resolution, resource allocation and overall spending. The architecture enables cable operators to measure risks in terms of their financial or reputational impact. Outcomes of implementing the architecture typically include: l Improved customer experience; l Reduced organisational risk; l Reduced operational expense; l Competitive advantages. The need for information architectures An Integrated Business Architecture provides an industry agreed, service-oriented approach for rationalising operational IT, processes and systems. By using standard, reusable, generic blocks, businesses gain the advantage of standardisation while still allowing customisation where necessary. This, in turn, enables cable operators (and other service providers) to significantly reduce their operational costs and improve customer service and business agility. The TM Forum has published IT and process architecture that embraces major IT industry standards such as ITIL and TOGAF. The Framework is a hierarchical catalogue of the key business processes required to run a service-focused business. (See sidebar overleaf.) Core business entities To effectively serve their customers, cable operators have developed and evolved a number of definitions for core concepts such as locations, addresses, individuals and organisations, products, services and resources. Information Business Architectures were designed to work in concert with and report on Core Business Entities. These attributes represent a core set of objects. They have strength through being clearly defined and reusable. Ideally, they should be implemented once and then be accessed via a core model. These objects are referred to as the Core Business Entities in the information architecture. Core Business Entities are the core set of things in which any enterprise is interested. (See sidebars 2 and 3 on pages 47 and 49). They are typically responses to Who, What, Where, Why and Why questions, as represented in Figure 1 below. Who: “Who” is the Party or Party Role. This can be Customers, Service Providers, Employees and other individuals and organisations that interact with the business. During these interactions, Parties play ‘Roles’ which have a number of typical characteristics. These include attributes such as Name, Address, Contact Medium etc. Parties are typically tracked by the business during the lifecycle of their respective interactions. What: “What” is the Product, Service or Resource. l Products are typically customer-facing services or resources. This includes Data, Telephony, High Speed Data or even a broadcast event. l In contrast, a Service is typically something provided either to support a Product, or as a result of the Product. For example, it could be “installation” services or “streaming” service to delivery the broadcast event. l Resources are part of an enterprise’s infrastructure and are used by the Service. This includes the cable plant and associated inventory. Figure 1: Relationship of Who, What, Where, Why and When in a Core Business Entity. By Myles Kennedy, Laurie Asperas and Evan Birkhead, Rev2 Networks In this final entry of its three-part, back-office series, the Rev2 Networks’ team describes an Information Business Architecture that enables efficient Cable TV customer care and network operations. The first article explained how to track the customer journey through intelligent analytics of End-to-End Customer ticketing. The second explained how Event Processing Networks provide efficient, real-time management of customer data. Emerging Technologies:An Information Business Architecture that Enables Efficient Cable Operations and Enhances Customer Experience Myles is an internationally experienced customer relationship consultant with expertise in business analysis, service design and transition, and operational best practices. Myles Kennedy, Business Development & Product Consultant technicaltechnical Laurie has worked in diverse industries tracking strategy and technology successfully through time. Navigating different social groups, she connects social needs and technologies. At Rev2, her role is focused on expanding the footprint of RiskView, the flagship product. Laurie Asperas, Strategy Officer Evan’s tech sector experience dates back to his years in journalism when he was news editor of LAN Computing magazine (1990-94) and editor-in-chief of Internetwork magazine (1994-97). He has been in network industry marketing ever since. Evan Birkhead, Business Development
  • 2. 60 61Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue This enables predictive analytics that identify problems before they snowball out of control. By catching costly issues early in their lifecycle, the system prevents the “death by a thousand paper cuts” that is dreaded by CFOs. Technical overview The architecture is a highly extensible platform for fact-based, scalable, repeatable business risk analytics and decision- making. It actively mines, weighs and correlates inputs from disparate heterogeneous data sources. At the heart of the architecture is an analytical Risk Data Warehouse that is fed by Data Source Adapters as shown in Figure 2 above. The domain expertise designed into the Adapters for collection and abstraction of data sources distinguishes the architecture from generic business intelligence solutions. Collectively, Adapters span the entire cable operator’s business. The net result is a time-based snapshot of business performance. A key differentiator of the architecture is its ability to identify the business materiality of risks according to their potential impact on business performance, which helps operators to prioritise business processes, problem resolution and overall spending. Additionally, the architecture’s unique ability to normalise and correlate data across multiple data sources allows for a quantitative comparison and measurement of different risks. The architecture enables a materiality score to be assigned to each risk across the operator’s service delivery infrastructure, enabling material risks to stand out from the rest. After collecting vulnerability data throughout the business, a score is assigned to each “risklet” that reflects its likelihood to cause What are entities? A business entity is a thing of interest to the business. Business entities are characterised by attributes. Business entities also possess other properties, such as involvement in associations with other business entities or entity types and exhibition of behaviour. These properties (attributes, associations and behaviour) of business entities may be inherited by the other entity types or other business entities. A core business entity represents five basic concepts present in the day-to-day running of every enterprise. The concepts are who, what, where, when and why. These business entities support processes in the Product, Service and Resource layers of the eTOM. A core business entity may also be a business entity that is common to a number of eTOM processes, for example Location and Address. A core model contains the artifacts that fully describe core business entities. The artifacts include core business entity definitions and UML models. The UML models contain class diagrams that document the attributes and operations of the core business entities. Figure 2. Operations and care information architecture. technicaltechnical Where: “Where” is the physical or logical Location or Address. Locations are typically an actual place, such as a building. Addresses, on the other hand, are typically a means of finding a location. As a result, multiple Addresses may point to one Location: for example, the “third house on the left” is the same location as #10 Long Street. “Where” entities are associated with a number of other business entities, including Parties, Interactions, Resources, Services, Products etc. Why: “Why” is the reason or trigger for an interaction. An Interaction is an activity between parties – such as a customer placing a VOD order or the VOD order being played out (in this case, this would be considered two interactions). Interactions commonly also involve Products, Service, Locations, Resources etc. They can also take the form of contracts or communications. When: “When” is simply the timing of an interaction. A number of core business entities, such as Party and Interaction, represent abstract concepts. Specialised child subclasses are in turn defined underneath them, and inherit the behaviours, attributes and associations of the Core Business Entity. The materiality score A new Business Information Architecture, which implements these concepts, is based on a unique technical capability - it can normalise and correlate data from multiple data sources within the Cable TV service delivery infrastructure. This enables operators to quantitatively compare and measure different risks. In Cable TV operations, the architecture clearly demonstrates immediate value with its ability to import and correlate data from multiple sources (such as telemetry, customer databases, service reports, trouble tickets, network events etc.). Data correlation enables it to pinpoint cross-departmental and enterprise-wide infrastructure issues that are negatively impacting the customer experience. As mentioned, the architecture uses a unique scoring approach that measures the “materiality” of events based on either actual financial costs to the business or reputational costs, a formula based upon events that adversely impact the customer experience. The materiality score can highlight events that don’t meet typical thresholds for identification or mitigation but that, in total, have significant impact on the business. The more data collected, the more accurate the score. Additionally, the more data collected, the more likely the system is to detect problems before they cross thresholds and are noticed by operators. Information architectures in the cable industry A number of alternative information and data models (and model fragments) are commonly used in the Cable and Telecommunications industry today. This includes efforts from fora such as the International Telecommunications Union (ITU); the Internet Engineering Task Force (IETF); the Internet Protocol Detail Record Organisation (iPDR.org); the TeleManagement Forum; the Object Management Group (OMG); the DMTF (Distributed Management Task Force); the T1M1 committee of the Alliance for Telecommunications Industry Solutions (ATIS); the OSS through Java Initiative (OSS/J) and others who have developed models and model fragments. These models form the basis of systems’ interoperability, but the sheer variety of available models highlights the need for a standardised information architecture to unite these industry models. The TeleManagement Forum’s Shared Information and Data Modelling team (SID) is a core model that represents one such effort. It has gained acceptance within the communications and information services industry. In particular, the ITU/T1M1 use the SID as a source for its Global Telecom Data Dictionary (GTDD) and the OMG’s Telecom Domain Task Force configuration- independent model is based on a SID foundation. The SID is fundamentally an Information Model. It is a representation of business concepts, their characteristics and relationships, described in an implementation-independent manner. It offers an information reference model with a common vocabulary that can be leveraged between systems and businesses. These entities are typically packaged and documented via UML models. The presentation is in the form of a layered framework that partitions the shared information and data into eight high- level domains. These domains are broadly aligned with eTOM.
  • 3. 62 63Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue l Identity / Party (who) l Individuals and Organisations l Customer (actual or potential) l Supplier l User l Time & Time Period (when) l Calendar l Places / Locations (where) l Locations and Sites l Addresses l Motivation (why) l Business Planning l Work (how) l Plan and Project l Process l Policy (how) l The Business (what) l Agreement and Contract l Product l Service l Resource l Event (when) l Financials (what) decision-making. It runs as a VMware virtual machine and, as such, requires minimal or no hardware infrastructure. The domain expertise embedded in Adapters for collection and abstraction of data sources is proprietary and distinguishes it from generic business intelligence solutions. The Adapters connect to data sources such as ticketing systems (such as Remedy), billing systems, telemetry systems (such as ARRIS ServAssure) and WFM systems (such as ARRIS WorkAssure) etc. The data contains issues gathered from customer support calls; premises and plant truck rolls; telemetry; NOC alarms etc. The net result is a time-based snapshot of business performance. The data records are parsed, classified, weighted, stored, correlated and later presented through a user interface or a text file generated by the system. The metrics imported into the architecture are scalable over time. Since the Data Source Adapters are written in PERL, Example entities Figure 4. This is a typical report showing streets ranked according to their actual financial cost to operate over a 7-day period. The key to colours and metrics is shown at the bottom of the screen, along with the mathematical definitions for Count, Financial Cost and Reputational Cost. Conn Calls refers to the number of Customer Calls related to Connectivity. technicaltechnical a problem as well as the impact that this problem would cause. The architecture was designed to address the reality that the same risks have multiple impacts on the business. Differentiators The architecture distinguishes itself in several ways: l It takes a typical risk conversation from a technical to a business level, based upon the materiality of adverse business outcomes. l The analytics, while based upon standards, have been extended to accommodate senior executives by including impact values and classifications. These include the aforementioned financial and reputational risks, as well as analytics describing the geographic centre of issues and organisational views. l It considers both the raw score of each vulnerability and the business role of the asset on which it exists. This mapping is critical, since the same vulnerability on a desktop or on a server, for example, might have a very different business impact. l The visualisation engine, which employs a “radar chart”- style user interface is innovative and allows users to quickly isolate “outliers”. Outliers can be vulnerabilities that drive disproportionate total risk, those with unusual profiles etc. l The correlation engine allows multiple data sources to be used to more thoroughly identify key drivers of risk, and “normalises” data to allow quantitative comparisons of risk across different tools. Solution architecture The architecture is a lightweight, highly extensible platform for fact-based, scalable, repeatable business risk analytics and Figure 3. Radar charts display the most material risks as the farthest from the centre. In this case, the chart shows material risks according to various geographies.
  • 4. 64 65Vol. 36 No. 4 - November 2014 Issue Vol. 36 No. 4 - November 2014 Issue technicaltechnical Rev2 Networks is a thought-leading Business Risk Analytics™ provider focused on delivering solutions that improve business performance. Its patent-pending RiskView® Risk Concentration Analysis™ framework offers the ability to identify, compare and quantify vulnerabilities across the entire enterprise before they impact business performance. By correlating and weighting existing risk data from sources throughout your infrastructure, the RiskView Business Risk Analytics® solution identifies hidden issues that are costing you the most money and causing your customers the most pain – before they snowball out of control. RiskView identifies the materiality of risks according to their potential impact on business performance, helping customers to prioritise and schedule business process improvement, problem resolution and overall spending. RiskView outcomes typically include reduced organisational risk profile; reduced OpEx; improved customer experience and competitive advantage. they are extensible to rapidly support new data sources as they become available. Real-world customers are importing hundreds of gigabytes of data into the Data Warehouse. In addition, the architecture has been extended to automatically collect telemetry and workforce management data and to automatically generate and open new tickets for the field service team that rank issues according to materiality. By enabling field service to address network issues before they impact more customers, the architecture is saving operational and support costs and improving overall customer experience. About Rev2 Networks