Application Portfolio Management, the Basics - How much Software do I haveFrank Vogelezang
After two external benchmarks, the Software Application Support division decided that the only way to quantitatively manage application support was by establishing a sufficient estimate of the size of the application portfolio. Based on criteria from Gartner’s Application Benchmark a selection was made regarding which applications made up the application portfolio. Five different methods were used to size approximately three hundred applications, each with its own precision and cost efficiency: Gartner Fast FPA estimation, Backfiring from LoC for some older PL/1 and Assembler applications, detailed counts with NESMA FPA and COSMIC for newly developed systems and backtracking from budget for less important smaller applications. The size estimations were made by regular support personnel with little training in functional size measurement. A sample selection was reviewed by an experienced consultant, in order to detect possible pitfalls and ambiguities. The results from the review led to a re-evaluation of most of the FPA-estimations, with a higher precision and greater consistency. The results of these size estimates can now be used to compare parts of the portfolio and to quantitatively manage the (support of the) portfolio.
An Integrated Approach to Application Portfolio RationalizationCognizant
An application portfolio rationalization (APR) process can yield great IT gains in TCO, COGS, ROI and maneuvering room for new projects and technologies. Properly conducted, an AVR will uncover key retirement, integration or technical remediation opportunities, but it requires business buy-in and clear goals as well as the effective use of proven tools and accelerators.
Application Portfolio Management, the Basics - How much Software do I haveFrank Vogelezang
After two external benchmarks, the Software Application Support division decided that the only way to quantitatively manage application support was by establishing a sufficient estimate of the size of the application portfolio. Based on criteria from Gartner’s Application Benchmark a selection was made regarding which applications made up the application portfolio. Five different methods were used to size approximately three hundred applications, each with its own precision and cost efficiency: Gartner Fast FPA estimation, Backfiring from LoC for some older PL/1 and Assembler applications, detailed counts with NESMA FPA and COSMIC for newly developed systems and backtracking from budget for less important smaller applications. The size estimations were made by regular support personnel with little training in functional size measurement. A sample selection was reviewed by an experienced consultant, in order to detect possible pitfalls and ambiguities. The results from the review led to a re-evaluation of most of the FPA-estimations, with a higher precision and greater consistency. The results of these size estimates can now be used to compare parts of the portfolio and to quantitatively manage the (support of the) portfolio.
An Integrated Approach to Application Portfolio RationalizationCognizant
An application portfolio rationalization (APR) process can yield great IT gains in TCO, COGS, ROI and maneuvering room for new projects and technologies. Properly conducted, an AVR will uncover key retirement, integration or technical remediation opportunities, but it requires business buy-in and clear goals as well as the effective use of proven tools and accelerators.
Webinar: How to get started on a Software Asset Management programFlexera
How to get started on a Software Asset Management program
Link to see the recorded webinar:
http://learn.flexerasoftware.com/content/ELO-WBNR-Get-Started-Optimized-SAM
Making Architecture Business Value Driven - Dave Guevara
The Denver IASA June 2008 meeting looked at the Business of Architecture. This discussion will look at one part of the broad topic, the business and strategic alignment processes that align IT to be business value driven.
The alignment that we will focus on is between the strategic intent of a company, and the capabilities that are needed to implement the business processes and technologies that will execute that strategic intent. A case study example will be used to illustrate some of the “how to” methods for doing this in your organization. This session will be interactive.
In addition to discussion these new concepts relating strategic intent to capabilities (Business, Organizational, Technical, Integration) we will also take a brief look at getting from capabilities down to User Story inventories and ultimately into services development. Recent feedback from the Agile conference was that these concepts and their use were spot on to where the thought leadership is moving to in the Agile field.
This document would help to face the challenges in ERP implementation broadly,
- Freezing the requirement before UAT
- Split the phases based on business demand
- Ensure the user experience before Go LIVE
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
Mark Stebleton, Oracle GRC Advanced Controls Product Management and Daryl Geryol, Navillus Partners explain how to optimize your Order to Cash process.
Ramco ERP for Facility Management ServicesRamco Systems
Whether you are into hospitality & housekeeping, guarding & security or maintenance & engineering services, Ramco ERP for Facility Management Services (FMS) sector can help transform your business and accelerate success.
Commercial risk management and contracting good practice. Digital, automated assistance for you to manage your business
econsys is a SaaS platform hosted on the cloud providing commercial management good practice governance, in-built automated risk management and compliance.
Designed for specialist contracting businesses to control and manage end to end core commercial processes, econsys is built upon the premise of best practice and has been developed to directly address real issues and concerns experienced by real companies.
Workflow and BPM in the New Enterprise ArchitectureNathaniel Palmer
Business Level Agility is the ability for office workers to take control of the processes that run their organizations, to adapt their processes to their needs, and to respond to external change without involving programmers. Workflow and BPM are driving enterprise system architecture in a radical new direction that
allows for Business Level Agility. Enterprise applications can be structured to separate the “who” and the “when” from the “what” and the “how”. The former aspect is ephemeral with a strong dependence upon people, skills, customs, cultures, and other things that are flexible. The latter aspect is relatively stabile with a
strong dependence upon data structures, formal representations, and other concrete concepts. This talk will explain what this separation means, and how evolving standards will enable this transformation of the way we design our business critical IT infrastructure.
Presention of the 'Best Pratice'Session of the implementationof Oracle Profitability and Cost Management at large Bank. Presented by Erik de Rouck, Consultant @Tentive
Today, 80 percent of U.S. bankers would like to modernize their core deposit systems and they see a wide range of benefits in innovation, functionality and the overall financial return. Conversely, only 15 percent of bankers believe a new core deposit system will be installed in the next three years. This exclusive research from NTT DATA Consulting, unveils what factors are supporting and hindering core deposit system replacement today. For more information or to receive the white paper visit: http://americas.nttdata.com/Services/Services/Consulting/research.aspx
Webinar: How to get started on a Software Asset Management programFlexera
How to get started on a Software Asset Management program
Link to see the recorded webinar:
http://learn.flexerasoftware.com/content/ELO-WBNR-Get-Started-Optimized-SAM
Making Architecture Business Value Driven - Dave Guevara
The Denver IASA June 2008 meeting looked at the Business of Architecture. This discussion will look at one part of the broad topic, the business and strategic alignment processes that align IT to be business value driven.
The alignment that we will focus on is between the strategic intent of a company, and the capabilities that are needed to implement the business processes and technologies that will execute that strategic intent. A case study example will be used to illustrate some of the “how to” methods for doing this in your organization. This session will be interactive.
In addition to discussion these new concepts relating strategic intent to capabilities (Business, Organizational, Technical, Integration) we will also take a brief look at getting from capabilities down to User Story inventories and ultimately into services development. Recent feedback from the Agile conference was that these concepts and their use were spot on to where the thought leadership is moving to in the Agile field.
This document would help to face the challenges in ERP implementation broadly,
- Freezing the requirement before UAT
- Split the phases based on business demand
- Ensure the user experience before Go LIVE
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
Mark Stebleton, Oracle GRC Advanced Controls Product Management and Daryl Geryol, Navillus Partners explain how to optimize your Order to Cash process.
Ramco ERP for Facility Management ServicesRamco Systems
Whether you are into hospitality & housekeeping, guarding & security or maintenance & engineering services, Ramco ERP for Facility Management Services (FMS) sector can help transform your business and accelerate success.
Commercial risk management and contracting good practice. Digital, automated assistance for you to manage your business
econsys is a SaaS platform hosted on the cloud providing commercial management good practice governance, in-built automated risk management and compliance.
Designed for specialist contracting businesses to control and manage end to end core commercial processes, econsys is built upon the premise of best practice and has been developed to directly address real issues and concerns experienced by real companies.
Workflow and BPM in the New Enterprise ArchitectureNathaniel Palmer
Business Level Agility is the ability for office workers to take control of the processes that run their organizations, to adapt their processes to their needs, and to respond to external change without involving programmers. Workflow and BPM are driving enterprise system architecture in a radical new direction that
allows for Business Level Agility. Enterprise applications can be structured to separate the “who” and the “when” from the “what” and the “how”. The former aspect is ephemeral with a strong dependence upon people, skills, customs, cultures, and other things that are flexible. The latter aspect is relatively stabile with a
strong dependence upon data structures, formal representations, and other concrete concepts. This talk will explain what this separation means, and how evolving standards will enable this transformation of the way we design our business critical IT infrastructure.
Presention of the 'Best Pratice'Session of the implementationof Oracle Profitability and Cost Management at large Bank. Presented by Erik de Rouck, Consultant @Tentive
Today, 80 percent of U.S. bankers would like to modernize their core deposit systems and they see a wide range of benefits in innovation, functionality and the overall financial return. Conversely, only 15 percent of bankers believe a new core deposit system will be installed in the next three years. This exclusive research from NTT DATA Consulting, unveils what factors are supporting and hindering core deposit system replacement today. For more information or to receive the white paper visit: http://americas.nttdata.com/Services/Services/Consulting/research.aspx
BPM Applications Infrastructure enables BPM models to be easily implemented across enterprises by integrated a declarative framework that allows definition of the business environment (business rules) to be kept separate from the process and applications.
Conig® v1.5 Converged Information GovernanceYalcin Gerek
CONIG® (Converged Information Governance) is a governance framework developed by TAC A.S. addressing information and related technologies. Its main focus is INFORMATION. CONIG® is based on models that are widely used for Information Technologies, Corporate Governance as well as Business Governance.
6.18.2013 - 2013 - Prj & Port Mgmt SftDev - Portfolio Management - For the ...IBM Rational
Webcast Series: Project and Portfolio Management Software Development
Title: 2013 - Prj & Port Mgmt SftDev - Portfolio Management - For the Manager - Making Good Decisions
Date: 6-18-2013
Presenter: Chris Wolters
Max Poliashenko - Enterprise Product Architectureiasaglobal
Enterprise Product Architecture(EPA) is a new kid on the block that hasn't been established as well nor even well understood by industry analysts, yet it may be crucial for software product companies. EPA combines methods and governance models of EA however directed at customer facing solution or software products which gives it a distinctly different set of concerns and techniques.
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
Organizations rely on analytics to make intelligent decisions and improve business performance, which sometimes requires reproducing business processes from a legacy application to a digital-native state to reduce the functional, technical and operational debts. Adaptive Scrum can reduce the complexity of the reproduction process iteratively as well as provide transparency in data analytics porojects.
Removing the barriers to business transformation with ArchiMateCorso
Typical Entry Points for Enterprise Architecture
What is ArchiMate?
How ArchiMate helps business transformation
Current tools used to manage business transformation
SI Alliance Marketing - Insurance Analytics Solution WebinarDavid Castro
Go to market joint webinar presenting digital transformation process and impact using insurance analytics. State Auto insurance customer, Deloitte strategic SI and solution development, and Qlik analytics technology. Presented by Qlik. 2016.
Copy and paste to access the full recording: http://www.castsoftware.com/news-events/event/gartner-technical-debt?gad=ss
-------------------------------------------------------
In this webinar David Norton of Gartner Research discusses recent findings on Technical Debt that estimates industry IT debt is at $500 billion—and on target to reach $1 trillion by 2015. He also talks about the importance of Software Analysis & Measurement to manage Technical Debt, how to measure debt continuously to control TCO of the application lifecycle and include debt measurement in project management and prioritization.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
3. 3
Modernisation – The Challenges
• $m’s spent encapsulating business logic and rules into code
• Difficult to justify a full systems replacement (risk, impact, result)
• Many organisations are advocating “Transformation (essentially
Code translation)” led initiatives.
• This approach is both flawed and precarious
• It is Flawed in that;
– Rules encapsulated in language-A are translated into language-B
– Translating procedural languages to Java, C#, etc means pushing a
procedural model into an OO model without any benefits
– It results in an OO model based on program structure of the original
system and not a real world model based on the business
– It leads to a system that is incomprehensible to original team and a
complete mess to any new developers in the targeted language
• It is Precarious in that it presents a false sense of hope
4. 4
Architecture View – Business Focused
Finance
(GL, AR, AP, etc)
Reporting,
Analytics BI
Personal and
Environmental
Data Capture
Correspondence
Management
Security Access
BPM Work
Flow
Business Rules
Integration
Management
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Prospect and
Quotation
Management
Commission
Sales Channel
Management
Product
Management
Actuarial
Governance, Risk
Compliance
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS – Industry Specific
TIER 2 FUNCTIONAL AREAS – SUPPORT THE BUSINESS – Industry Specific
TIER 3 FUNCTIONAL AREAS – CONTROL FOUNDATIONAL – Non-industry Specific
5. 5
Architecture View – Business Focused
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS – Industry Specific
Policy Unit
Management
Automated
Transactions
Billing
Collections
Policy
Management
On-line
Transactions
….. …..….. …..…..
6. 6
Single Core Application – High Investment – Code Driven Configuration
Architecture View – Today’s Environment
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Commission
Sales Channel
Management
Product
Management
Actuarial
Governance,
Risk
Compliance
TIER 2 FUNCTIONAL AREAS – SUPPORT THE BUSINESS
Finance
(GL, AR, AP,
etc)
Reporting,
Analytics BI
Personal and
Environmental
Data Capture
Correspondence
Management
Security Access
BPM Work
Flow
Business Rules
Integration
Management
TIER 3 FUNCTIONAL AREAS – CONTROL FOUNDATIONAL – Non-industry Specific
7. 7
Modernisation Goals
• The Goal should be to deliver “Modernization” not “Translation”
• Modernization is a path to;
– Reduce Cost on new initiatives (Products, Distribution channels, etc)
– Release business rules from code into configuration models
– Protecting core value built into the existing application stack
– Decommission of some legacy functions and integration of modern
components into the overall solution
– Present a modern UI and UX to the user and client community
8. 8
Modernisation Architecture Principles
• The architectural principles can be referred to as “Separation of
Interests” and “Application Layers”. The target is to follow a roadmap
that;
– Delivers agility in meeting market needs
– Mandates a rapid rollout of modernised UI and UX
– Provides protection of “perceived value” from spend to date
– Enables flexibility in choice of technology components that meet business
needs
– Results in a modern integrated solution stack
– Protects the business from the hassles of technology change
– Involves the business fully in the delivery of the business focused
initiatives
– Transitions to the desired state over a maximum 2-3 year timeframe
9. 9
Modernisation Execution Requirements
• Demonstrated and proven knowledge of the business vertical being
addressed
• A fully functional and easily configurable UI / UX component that
enables rapid transition to a modern experience for the user
community
• Deep knowledge of the incumbent legacy application(s)
• A proven set of components to provide rapid configuration and
management capabilities in key areas that will provide the best
positive impact to the business
• A solid roadmap that does not fundamentally change for each client
• A core team of “experts” who truly understand the challenges from
business, application, architecture and technology perspectives
• A toolset that allows rapid legacy application analysis, rule extraction
and code refactoring
10. 10
Building Out a Roadmap
• Identify the key areas of pain
• Focus on fast value that will have a positive impact on the business
• Be seen to deliver
• Publish the roadmap and communicate progress challenges
• Run the project outside of normal project channels and
administration
• Re-use, before Buy. Before Build
11. 11
Deliver a Modern UI / UX
UI / UX Layer Focused on Insurance Transactions
Integration Layer working with Web Services or JSON API’s
Browser Based Mobile Ready Process FocusedSocial
Conformity
Secondary
Systems for
additional relevant
data, etc
Foundational
applications for
rules, documents,
etc
• Legacy system will be service
enabled via;
– Business Transaction wrapper API’s
– Transaction decomposition
12. 12
Single Core Application – High Investment – Code Driven Configuration
Architecture View – Primary Areas for Componentisation
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Commission
Sales Channel
Management
Product
Management
Actuarial
Governance,
Risk
Compliance
TIER 2 FUNCTIONAL AREAS – SUPPORT THE BUSINESS
Finance
(GL, AR, AP,
etc)
Reporting,
Analytics BI
Personal and
Environmental
Data Capture
Correspondenc
e Management
Security Access
BPM Work
Flow
Business Rules
Integration
Management
TIER 3 FUNCTIONAL AREAS – CONTROL FOUNDATIONAL
13. 13
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS – Industry Specific
Policy Unit
Management
Automated
Transactions
Billing
Collections
Policy
Management
On-line
Transactions
Architecture View – Primary Areas for Componentisation
14. 14
Single Core Application – High Investment – Code Driven Configuration
Architecture View – Secondary Areas for Componentisation
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Commission
Product
Management
Actuarial
Governance,
Risk
Compliance
TIER 2 FUNCTIONAL AREAS – SUPPORT THE BUSINESS
Finance
(GL, AR, AP,
etc)
Reporting,
Analytics BI
Personal and
Environmental
Data Capture
Security Access
BPM Work
Flow
Integration
Management
TIER 3 FUNCTIONAL AREAS – CONTROL FOUNDATIONAL
Sales Channel
Management
Correspondence
Management
Business Rules
15. 15
Core Insurance
Processing
Policy ClaimsNew Business
Party
Management
Prospect and
Quotation
Management
TIER 1 FUNCTIONAL AREAS – RUN THE BUSINESS – Industry Specific
Policy Unit
Management
Automated
Transactions
Billing
Collections
Policy
Management
On-line
Transactions
Architecture View – Secondary Areas for Componentisation
16. 16
Architecture View – Technical Conversion
Convert all remaining transactions
(which are essentially batch) to be
initiated by a generic transaction
engine
Convert the DB to
be SQL DDL driven
if not already done
Refactor the platform specific
COBOL code to a standard version
such as micro-focus
Version control and change
management are handled via standard
Git or SVN tools