SlideShare a Scribd company logo
Copyright © 2013 Value Realization Inc.
Migration Approach
Questionnaire / Checklist
Prepared for a large big data systems integrator.
Copyright © 2013 by Value Realization Inc.
Article I. Introduction
Migration of information technology components and processes should be preceded by a “discovery
phase”. The output or result of this discovery phase is a document that typically captures known
facts and unknowns, but also solicits a fair idea on perceived limitations or future expectations of
state stakeholders of the current state. This result document should represent a” living / working
state document”. This tool therefore is a critical input for subsequent high-level phases in the
migration approach, namely, Discovery phase, Envisioning phase, Program commencement, and
Final Migration Results.
Article II. Intended Audience
Stakeholders representing the current state as well as future state including members of IT teams,
Business teams, business drivers, IT drivers and program sponsors.
Article III. Document Maintenance and Use Guidelines
 This document solicits information from across stakeholder groups.
 This document should be collaboratively and progressively updated.
 Expect responses to be progressively available and validated.
 If response is not known, state so, so progressive discovery exercises can be undertaken.
 Each draft release* should be maintained as a separate dated version for tracking.
 Additional discovery / fact check questions can be incorporated.
 Multiple conflicting responses should be flagged and resolved.
 Attach Addition sheets if required to the questionnaire.
 A copy of this sheet can be handed to as many appropriate respondents as required.
 Copies received from respondents should be reviewed and verified for Consistency and Accuracy
in responses to sections B and C.
 If there is any inconsistency in responses to sections B and C, they should be reconciled and
resolved.
 Multiple respondent copies can be merged as one draft release*
 Progressive updates will result in subsequent version of the release.
 Questionnaire responses will be used to construct the checklist for Migration Program.
 All checklist items should reflect in Project WBS.
Copyright © 2013 Value Realization Inc.
A. Management (to be filled by business users, drivers and sponsors)
1. List one or more limitations, perceived or otherwise of the Current State, that you would like to
see improved or incorporated in the Future State. Few options are listed for reference.
☐Performance ☐Business capabilities ☐Scalability ☐User Interactions+
☐Others (please list) ☐Governance ☐ Data Accuracy
☐Integration with Other Systems ☐ Increased Visibility*
☐Service Levels ☐Others (please list)
+ The technology ecosystem user friendliness including getting timely, appropriate information and initiating
workflows if applicable and as appropriate.
* Visibility per Segregation of Duties (SOD) into Data, Audit, Authorization, workflows etc.
<Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if
required, for this Q>
2. List one or more expected / desired outcomes from the Future State.
☐Performance ☐Business capabilities ☐Scalability ☐User Interactions+
☐Others (please list) ☐Governance ☐ Data Accuracy
☐Integration with Other Systems ☐ Increased Visibility*
☐Service Levels ☐Others (please list)
+ The technology ecosystem user friendliness including getting timely, appropriate information and initiating
workflows if applicable and as appropriate.
* Visibility per Segregation of Duties (SOD) into Data, Audit, Authorization, workflows etc.
<Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if
required, for this Q>
3. List one or more tools you are currently using in the context of current state.
☐Spreadsheet + ☐Reporting Tools* ☐Others (please list)
+ Spreadsheets linked to Databases.
* List all reporting tools you are using.
<Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if
required, for this Q>
Copyright © 2013 Value Realization Inc.
B. Technology (to-be-filled by technical teams)
* All information in sheets below requested strictly within the Scope of Current State.
* Assumed that Current State “Scope” is broadly defined. Example: “Oracle CRM migration”.
I. Infrastructure
1. List all Servers and related information in a spreadsheet table format.
a. Server names
b. IP Addresses
c. Detailed Server Configurations including versions, disk capacities etc.
d. Security configurations including DMZ ports configurations, use etc.
e. Operating Systems installed including versions etc.
f. Databases installed including versions etc.
g. Other software e.g. COTS packages, ETL software, Drivers etc.
h. Identify Dependency points.
Examples include: Any installed component directly dependent on any components
outside the Current State Scope /other systems etc. or vice-versa.
i. List of Server Logins (and users), authorization levels and user categorization (if any).
2. List all vendors and support teams for each software/infrastructure component above.
3. List all SLAs, vendor contracts and Application category associated with above installed base.
Examples of Application category include, COTS, legacy, homegrown, Cloud Vendor-hosted,
Private Cloud, Open Source, Licensed etc.
4. List other applicable external dependent capabilities, SLA/contracts and policies
Example: BCP, DR, Security Policies, Data Retention Policies.
II. Software Configurations
1. List all Applications (Business Application names) and for each Business Application provide
a. Database(s), Database Server and IP(s)
b. Web Server(s), Middleware, and Reporting Server(s) etc.
c. Physical Architecture Specifications for each Server above.
d. Server Repository (if any) architecture, configuration specifications. Example: Reporting
Server repository and custom configurations.
e. Schemas and documentation describing use and dependencies.
f. Database Users, purpose of access granted to user, whether Active or Dormant.
g. Roles and Privileges
h. List All sources of Data for the Respective Application(s)
i. List all Subscribers for the Respective Application(s)
j. Database Sizing, Planned and Actuals, both. Compute Annual Growth Rate if possible.
k. List All Access Points including ODBC Connections, Reporting Applications, R/W
Applications to each database.
Copyright © 2013 Value Realization Inc.
III. Software Architecture and Design
1. Identify, validate and audit documentation for:
a. Business Rules / functions implemented in the Current state Software System(s)
b. Data Model(s)
c. Physical Database Designs
d. Business Data dictionary with appropriate names data types, widths and descriptions
e. Meta data
f. Data publisher/ Subscriber data mappings, business integration rules, data integration
rules and ETL mappings.
g. Software used in conjunction of Current State Software Application(s). Examples:
Productivity software (SQL Navigator), SQL Loader, Java APIs etc.
h. Enhancements or Defect fixes, not available in other software documents like architecture
specifications, design specifications etc.
i. User requirements, change requests, high Level software architecture, design document
for the Current State System(s)/ Application(s)
j. Software Development Environments (Production, QA, Dev etc.) along with Server
name(s), IP(s).
k. Business function components/objects e.g. pre-defined reports, encapsulated data
components/objects, web services, customer developed APIs etc.
C. Process
1. Identify, validate and audit processes and process owners, teams built around the Current State
Application(s)/System(s)
a. Change Control
b. Release Management
c. Production support (infrastructure, software listed separately)
d. User training
e. Levels of Support (examples include L1, L2 L3 etc.)
f. Audit Control
g. Business and IT Governance, Risk and Compliance Processes, Tools leveraged,
documentation practices.
h. Access Authorization protocols, Segregation of Duties (SOD) policies, appropriate audit
rules etc.
i. Current State Software Development Methodology.
j. Current State Project Management Methodology.
C. People
1. Identify, verify and document stakeholders and stakeholder RASCI for each technology
component, processes above.
2. Create a High Level People, Technology, and Process Intersection Matrix.

More Related Content

What's hot

Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Schellman & Company
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Codemotion
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
Google
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
DATUM LLC
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
BrightPay Payroll and Auto Enrolment Software
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
Carlos Ayil
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
PECB
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
Hubilo
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
IT Governance Ltd
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
Digital Transformation EXPO Event Series
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
Curt Lewis
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
PECB
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework EL
Eugene Lee
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
Eugene Lee
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
Niklas Hjorthen
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
Dr Madhu Aman Sharma
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
Iris Maaß
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
GDPR
GDPRGDPR
GDPR
Microsoft
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
NetworkIQ
 

What's hot (20)

Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework EL
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
GDPR
GDPRGDPR
GDPR
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 

Similar to Migration approachquestionnaire checklist

Functional specification documents of
Functional specification documents ofFunctional specification documents of
Functional specification documents of
rtu
 
Salesforce Winter '23 Release Highlights.pptx
Salesforce Winter '23 Release Highlights.pptxSalesforce Winter '23 Release Highlights.pptx
Salesforce Winter '23 Release Highlights.pptx
Om Prakash
 
0.3 aim phases_and_documentations
0.3 aim phases_and_documentations0.3 aim phases_and_documentations
0.3 aim phases_and_documentations
Oracle HRMS Functional Consultant
 
Ebookblogv2 120116015321-phpapp01
Ebookblogv2 120116015321-phpapp01Ebookblogv2 120116015321-phpapp01
Ebookblogv2 120116015321-phpapp01
Shubhashish Biswas
 
A CRUD Matrix
A CRUD MatrixA CRUD Matrix
A CRUD Matrix
Cheryl Brown
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
Innovate Vancouver
 
Analysis Questionnaire - White Paper
Analysis Questionnaire - White PaperAnalysis Questionnaire - White Paper
Analysis Questionnaire - White Paper
Saurabh Goel
 
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
mary772
 
Business rules-extraction
Business rules-extractionBusiness rules-extraction
Business rules-extraction
Maran Gothandaraman
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
elliando dias
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
Chapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl EChapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl E
JinElias52
 
Tartaglia Matthew3
Tartaglia Matthew3Tartaglia Matthew3
Tartaglia Matthew3
Matthew Tartaglia
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
Moorthy Esakky
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
randhirlpu
 
Bug Tracking Java Project
Bug Tracking Java ProjectBug Tracking Java Project
Bug Tracking Java Project
Tutorial Learners
 
Reqs analysis
Reqs analysisReqs analysis
Reqs analysis
Dr. C.V. Suresh Babu
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)
ANISUR RAHMAN
 
Bi &amp; d wglossary
Bi &amp; d wglossaryBi &amp; d wglossary
Bi &amp; d wglossary
Rajni Bhardwaj Grover
 

Similar to Migration approachquestionnaire checklist (20)

Functional specification documents of
Functional specification documents ofFunctional specification documents of
Functional specification documents of
 
Salesforce Winter '23 Release Highlights.pptx
Salesforce Winter '23 Release Highlights.pptxSalesforce Winter '23 Release Highlights.pptx
Salesforce Winter '23 Release Highlights.pptx
 
0.3 aim phases_and_documentations
0.3 aim phases_and_documentations0.3 aim phases_and_documentations
0.3 aim phases_and_documentations
 
Ebookblogv2 120116015321-phpapp01
Ebookblogv2 120116015321-phpapp01Ebookblogv2 120116015321-phpapp01
Ebookblogv2 120116015321-phpapp01
 
A CRUD Matrix
A CRUD MatrixA CRUD Matrix
A CRUD Matrix
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Analysis Questionnaire - White Paper
Analysis Questionnaire - White PaperAnalysis Questionnaire - White Paper
Analysis Questionnaire - White Paper
 
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
 
Business rules-extraction
Business rules-extractionBusiness rules-extraction
Business rules-extraction
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Chapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl EChapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl E
 
Tartaglia Matthew3
Tartaglia Matthew3Tartaglia Matthew3
Tartaglia Matthew3
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
 
Bug Tracking Java Project
Bug Tracking Java ProjectBug Tracking Java Project
Bug Tracking Java Project
 
Reqs analysis
Reqs analysisReqs analysis
Reqs analysis
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)
 
Bi &amp; d wglossary
Bi &amp; d wglossaryBi &amp; d wglossary
Bi &amp; d wglossary
 

More from Nandeep Nagarkar

Agile work estimation template
Agile work estimation templateAgile work estimation template
Agile work estimation template
Nandeep Nagarkar
 
Organizational value model
Organizational value modelOrganizational value model
Organizational value model
Nandeep Nagarkar
 
Customer Data Integration Architecture Gudelinbes
Customer Data Integration Architecture GudelinbesCustomer Data Integration Architecture Gudelinbes
Customer Data Integration Architecture Gudelinbes
Nandeep Nagarkar
 
Case competitive benchmarking
Case  competitive benchmarkingCase  competitive benchmarking
Case competitive benchmarking
Nandeep Nagarkar
 
Business value realization of cloud content collaboration
Business value realization of cloud content collaborationBusiness value realization of cloud content collaboration
Business value realization of cloud content collaboration
Nandeep Nagarkar
 
A Machine learning based Data Quality Analysis Approach
A Machine learning based Data Quality Analysis ApproachA Machine learning based Data Quality Analysis Approach
A Machine learning based Data Quality Analysis Approach
Nandeep Nagarkar
 
Application support requirements & processes
Application support requirements & processesApplication support requirements & processes
Application support requirements & processes
Nandeep Nagarkar
 
Address module
Address moduleAddress module
Address module
Nandeep Nagarkar
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
Nandeep Nagarkar
 
Roadmap for Application Process Interactions
Roadmap for  Application Process InteractionsRoadmap for  Application Process Interactions
Roadmap for Application Process Interactions
Nandeep Nagarkar
 
Information Integration Data Quality
Information Integration Data QualityInformation Integration Data Quality
Information Integration Data Quality
Nandeep Nagarkar
 
Bookings Quality Score Model
Bookings  Quality Score ModelBookings  Quality Score Model
Bookings Quality Score Model
Nandeep Nagarkar
 

More from Nandeep Nagarkar (12)

Agile work estimation template
Agile work estimation templateAgile work estimation template
Agile work estimation template
 
Organizational value model
Organizational value modelOrganizational value model
Organizational value model
 
Customer Data Integration Architecture Gudelinbes
Customer Data Integration Architecture GudelinbesCustomer Data Integration Architecture Gudelinbes
Customer Data Integration Architecture Gudelinbes
 
Case competitive benchmarking
Case  competitive benchmarkingCase  competitive benchmarking
Case competitive benchmarking
 
Business value realization of cloud content collaboration
Business value realization of cloud content collaborationBusiness value realization of cloud content collaboration
Business value realization of cloud content collaboration
 
A Machine learning based Data Quality Analysis Approach
A Machine learning based Data Quality Analysis ApproachA Machine learning based Data Quality Analysis Approach
A Machine learning based Data Quality Analysis Approach
 
Application support requirements & processes
Application support requirements & processesApplication support requirements & processes
Application support requirements & processes
 
Address module
Address moduleAddress module
Address module
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Roadmap for Application Process Interactions
Roadmap for  Application Process InteractionsRoadmap for  Application Process Interactions
Roadmap for Application Process Interactions
 
Information Integration Data Quality
Information Integration Data QualityInformation Integration Data Quality
Information Integration Data Quality
 
Bookings Quality Score Model
Bookings  Quality Score ModelBookings  Quality Score Model
Bookings Quality Score Model
 

Recently uploaded

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 

Recently uploaded (20)

leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 

Migration approachquestionnaire checklist

  • 1. Copyright © 2013 Value Realization Inc. Migration Approach Questionnaire / Checklist Prepared for a large big data systems integrator.
  • 2. Copyright © 2013 by Value Realization Inc. Article I. Introduction Migration of information technology components and processes should be preceded by a “discovery phase”. The output or result of this discovery phase is a document that typically captures known facts and unknowns, but also solicits a fair idea on perceived limitations or future expectations of state stakeholders of the current state. This result document should represent a” living / working state document”. This tool therefore is a critical input for subsequent high-level phases in the migration approach, namely, Discovery phase, Envisioning phase, Program commencement, and Final Migration Results. Article II. Intended Audience Stakeholders representing the current state as well as future state including members of IT teams, Business teams, business drivers, IT drivers and program sponsors. Article III. Document Maintenance and Use Guidelines  This document solicits information from across stakeholder groups.  This document should be collaboratively and progressively updated.  Expect responses to be progressively available and validated.  If response is not known, state so, so progressive discovery exercises can be undertaken.  Each draft release* should be maintained as a separate dated version for tracking.  Additional discovery / fact check questions can be incorporated.  Multiple conflicting responses should be flagged and resolved.  Attach Addition sheets if required to the questionnaire.  A copy of this sheet can be handed to as many appropriate respondents as required.  Copies received from respondents should be reviewed and verified for Consistency and Accuracy in responses to sections B and C.  If there is any inconsistency in responses to sections B and C, they should be reconciled and resolved.  Multiple respondent copies can be merged as one draft release*  Progressive updates will result in subsequent version of the release.  Questionnaire responses will be used to construct the checklist for Migration Program.  All checklist items should reflect in Project WBS.
  • 3. Copyright © 2013 Value Realization Inc. A. Management (to be filled by business users, drivers and sponsors) 1. List one or more limitations, perceived or otherwise of the Current State, that you would like to see improved or incorporated in the Future State. Few options are listed for reference. ☐Performance ☐Business capabilities ☐Scalability ☐User Interactions+ ☐Others (please list) ☐Governance ☐ Data Accuracy ☐Integration with Other Systems ☐ Increased Visibility* ☐Service Levels ☐Others (please list) + The technology ecosystem user friendliness including getting timely, appropriate information and initiating workflows if applicable and as appropriate. * Visibility per Segregation of Duties (SOD) into Data, Audit, Authorization, workflows etc. <Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if required, for this Q> 2. List one or more expected / desired outcomes from the Future State. ☐Performance ☐Business capabilities ☐Scalability ☐User Interactions+ ☐Others (please list) ☐Governance ☐ Data Accuracy ☐Integration with Other Systems ☐ Increased Visibility* ☐Service Levels ☐Others (please list) + The technology ecosystem user friendliness including getting timely, appropriate information and initiating workflows if applicable and as appropriate. * Visibility per Segregation of Duties (SOD) into Data, Audit, Authorization, workflows etc. <Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if required, for this Q> 3. List one or more tools you are currently using in the context of current state. ☐Spreadsheet + ☐Reporting Tools* ☐Others (please list) + Spreadsheets linked to Databases. * List all reporting tools you are using. <Provide additional insight to each selection above, is applicable, in this section below. Attach additional pages, if required, for this Q>
  • 4. Copyright © 2013 Value Realization Inc. B. Technology (to-be-filled by technical teams) * All information in sheets below requested strictly within the Scope of Current State. * Assumed that Current State “Scope” is broadly defined. Example: “Oracle CRM migration”. I. Infrastructure 1. List all Servers and related information in a spreadsheet table format. a. Server names b. IP Addresses c. Detailed Server Configurations including versions, disk capacities etc. d. Security configurations including DMZ ports configurations, use etc. e. Operating Systems installed including versions etc. f. Databases installed including versions etc. g. Other software e.g. COTS packages, ETL software, Drivers etc. h. Identify Dependency points. Examples include: Any installed component directly dependent on any components outside the Current State Scope /other systems etc. or vice-versa. i. List of Server Logins (and users), authorization levels and user categorization (if any). 2. List all vendors and support teams for each software/infrastructure component above. 3. List all SLAs, vendor contracts and Application category associated with above installed base. Examples of Application category include, COTS, legacy, homegrown, Cloud Vendor-hosted, Private Cloud, Open Source, Licensed etc. 4. List other applicable external dependent capabilities, SLA/contracts and policies Example: BCP, DR, Security Policies, Data Retention Policies. II. Software Configurations 1. List all Applications (Business Application names) and for each Business Application provide a. Database(s), Database Server and IP(s) b. Web Server(s), Middleware, and Reporting Server(s) etc. c. Physical Architecture Specifications for each Server above. d. Server Repository (if any) architecture, configuration specifications. Example: Reporting Server repository and custom configurations. e. Schemas and documentation describing use and dependencies. f. Database Users, purpose of access granted to user, whether Active or Dormant. g. Roles and Privileges h. List All sources of Data for the Respective Application(s) i. List all Subscribers for the Respective Application(s) j. Database Sizing, Planned and Actuals, both. Compute Annual Growth Rate if possible. k. List All Access Points including ODBC Connections, Reporting Applications, R/W Applications to each database.
  • 5. Copyright © 2013 Value Realization Inc. III. Software Architecture and Design 1. Identify, validate and audit documentation for: a. Business Rules / functions implemented in the Current state Software System(s) b. Data Model(s) c. Physical Database Designs d. Business Data dictionary with appropriate names data types, widths and descriptions e. Meta data f. Data publisher/ Subscriber data mappings, business integration rules, data integration rules and ETL mappings. g. Software used in conjunction of Current State Software Application(s). Examples: Productivity software (SQL Navigator), SQL Loader, Java APIs etc. h. Enhancements or Defect fixes, not available in other software documents like architecture specifications, design specifications etc. i. User requirements, change requests, high Level software architecture, design document for the Current State System(s)/ Application(s) j. Software Development Environments (Production, QA, Dev etc.) along with Server name(s), IP(s). k. Business function components/objects e.g. pre-defined reports, encapsulated data components/objects, web services, customer developed APIs etc. C. Process 1. Identify, validate and audit processes and process owners, teams built around the Current State Application(s)/System(s) a. Change Control b. Release Management c. Production support (infrastructure, software listed separately) d. User training e. Levels of Support (examples include L1, L2 L3 etc.) f. Audit Control g. Business and IT Governance, Risk and Compliance Processes, Tools leveraged, documentation practices. h. Access Authorization protocols, Segregation of Duties (SOD) policies, appropriate audit rules etc. i. Current State Software Development Methodology. j. Current State Project Management Methodology. C. People 1. Identify, verify and document stakeholders and stakeholder RASCI for each technology component, processes above. 2. Create a High Level People, Technology, and Process Intersection Matrix.