US20040143470A1 - Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business - Google Patents
Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business Download PDFInfo
- Publication number
- US20040143470A1 US20040143470A1 US10/744,347 US74434703A US2004143470A1 US 20040143470 A1 US20040143470 A1 US 20040143470A1 US 74434703 A US74434703 A US 74434703A US 2004143470 A1 US2004143470 A1 US 2004143470A1
- Authority
- US
- United States
- Prior art keywords
- business
- enterprise
- architecture
- information
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/067—Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
- G06Q30/0204—Market segmentation
- G06Q30/0205—Location or geographical consideration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Definitions
- the present invention relates in general to business and information technology modeling techniques and in particular to a structure for and a method of modeling integrated business and information technology frameworks and architecture in support of a business.
- a method of modeling frameworks and architecture in support of a business that includes identifying manageable entities of the business.
- An overall architecture for the business is determined that defines how the manageable entities relate to each other.
- the overall enterprise architecture is represented in a tower model with six fundamental components—strategic plan, business architecture, information architecture, application architecture, technology infrastructure architecture, and enterprise information technology management framework.
- Each fundamental component or plane in the tower model may include sub-planes to further define the architecture of the business enterprise.
- a common language is implemented in order to articulate the overall architecture.
- Technology requirements for the business are analyzed, planned for, and implemented according to the overall architecture.
- the present invention provides various technical advantages over conventional business modeling techniques. For example, one technical advantage is to provide discipline for delivering repeatable and effective information technology enabling solutions to accommodate business needs. Another technical advantage is to promote integration of business and technology planning and establishing a technology strategy that both sustains and directs business efforts. Yet another technical advantage is to provide a common model for articulating the mandatory components of an enterprise architecture and the baseline for developing information technology planning and integration approaches. Still another technical advantage is to effectively manage a heterogeneous technology environment. Other technical advantages may be readily ascertainable by those skilled in the art from the following figures, description, and claims.
- FIG. 1 illustrates a planning continuum showing the intermediate steps from a business strategy to deliver information technology
- FIG. 2 illustrates the planning continuum in more detail showing inputs, outputs and relationships
- FIG. 3 illustrates a simplified block diagram of an enterprise architecture for a business, and how business and IT interrelate
- FIG. 4 illustrates fundamental strategic information technology planning framework components
- FIG. 5 illustrates an enterprise strategic information technology planning framework tower model
- FIG. 6 illustrates an operating environment model for the enterprise business
- FIG. 7 illustrates support and line functions for the enterprise business
- FIG. 8 illustrates a logical business location map
- FIG. 9 illustrates a geo-structural view of the logical business location map
- FIG. 10 illustrates an information technology investment and expenditure profile
- FIG. 11 illustrates a client information technology and industry expenditure benchmark
- FIGS. 12 A- 12 C illustrate the enterprise business frame with the external inputs and outputs and associated entities
- FIGS. 13 A- 13 D illustrate value stream aggregates of the business' enterprise
- FIGS. 14 A- 14 B illustrate a value stream event model and corresponding metrics
- FIG. 15 illustrates a process architecture for a value stream of the business enterprise
- FIG. 16 illustrates a value stream environment model
- FIG. 17 illustrates a process workflow scenario model for a value stream
- FIG. 18 illustrates enterprise information and data management framework and precepts
- FIG. 19 illustrates business intelligence scenarios
- FIG. 20 illustrates a geo-structural component view for information architecture
- FIG. 21 illustrates an information and data architecture data warehouse framework
- FIG. 22 illustrates an information application portfolio and system integration matrix
- FIG. 23 illustrates an example of an integrated application architecture for value stream enablement
- FIGS. 24 A- 24 B illustrate a geo-structural component view for an application architecture
- FIG. 25 illustrates an enterprise application software portfolio and system integration matrix
- FIG. 26 illustrates an example of application portfolio best practices recommendations
- FIG. 27 illustrates a technical reference model, associated platform, and governance structure of policies and standards
- FIG. 28 illustrates a logical location connectivity model
- FIG. 29 illustrates a logical location and logical software component matrix
- FIG. 30 illustrates a logical location software deployment scheme
- FIGS. 31 and 31A- 31 D illustrate a geo-structural component view for a technology infrastructure architecture
- FIG. 32 illustrates an example of technology infrastructure architecture best practices recommendations
- FIG. 33 illustrates a system management business model
- FIG. 34 illustrates enterprise systems management process models
- FIGS. 35 and 35A- 35 C illustrate a geo-structural component view for an information technology systems management architecture
- FIG. 36 illustrates an integration matrix for a systems management software portfolio
- FIG. 37 illustrates a geo-structural component view for an enterprise information technology management organizational framework
- FIGS. 38 A- 38 B illustrate the enterprise information technology management organizational model
- FIG. 39 illustrates a framework blueprint
- FIG. 40 illustrates a strategic information technology plan blueprint
- FIG. 41 illustrates how a blueprint guides formation of target models
- FIGS. 42 A- 42 B illustrate an approach to strategic information technology planning
- FIG. 43 illustrates the construction and implementation of a strategic information technology plan
- FIGS. 44 A- 44 B illustrate a strategic information technology framework workflow delivery scenario
- FIG. 45 illustrates the components of a strategic information technology plan
- FIGS. 46 A- 46 K illustrate the symbols used for noun and noun-like notations used in VDL modeling diagrams
- FIGS. 47 A- 47 J illustrate the symbols used for verb notations used in VDL modeling diagrams
- FIGS. 48 A- 48 G illustrate the symbols used for modifier notations used in VDL modeling diagrams
- FIGS. 49 A- 49 H illustrate the symbols used for preposition notations used in VDL modeling diagrams
- FIGS. 50 A- 50 F illustrate the symbols used for conjunction notations used in VDL modeling diagrams.
- Strategic planning provides the context and guidance that drives the definition of business functions, processes, systems, and organization. It is the process of defining the vision, mission and long term objectives for a business and the strategies for achieving them. The strategic planning process determines the actions and the allocation of the resources to meet those objectives. The resulting strategic plans allow the enterprise to effectively use its time, resources, intellectual capital and experience and transition from a current state to a new way of conducting business. In this document two enterprise planning processes are of major interest because of their direct correlation and interdependencies. First is Strategic Business Planning, which is the process of defining the mission and long-term objectives for the business and the strategies for achieving them.
- Strategic IT Planning is the process of defining frameworks and architectures in support of the business, and creating the plan for implementing those frameworks and architectures.
- the focus is on IT planning, the output of the strategic business planning process, the business plan, is what drives and must always be considered in the creation of a successful IT plan.
- an enterprise will have the appropriate strategic information frameworks guiding the appropriate technology direction necessary to effectively implement the organization's business direction.
- FIG. 1 is a high level diagram illustrating a full planning continuum 1000 from business strategy through IT strategy to IT solutions delivery.
- IT planning is an integral part of that continuum.
- it is critical to make accurate and timely decisions about what technology to invest in, when change should occur, and what value the business will receive by implementing a new technology paradigm. To insure that these decisions are reasonable, the IT strategic planning process and deliverables need to be driven and guided by the business context within which the enterprise will reside.
- FIG. 2 maps to the high level diagram of FIG. 1 and shows the range of business activities from business planning and process improvement through to the delivery and management of IT solutions to support the business processes.
- the boxes on the left hand side represent intellectual capital in the form of models and template solutions.
- the boxes on the right hand side represent the products delivered to a client and are the major components of an IT plan.
- the process thread running down the diagram illustrates how the activities and inputs and outputs relate to each other.
- the bars on the right of the diagram depict the scope of activities provided by various organizations and approximate the rudimentary composition of the Strategic IT Planning Framework Tower model.
- the Enterprise Strategic IT Planning Framework Tower model in conjunction with a suite of IT planning services fills the gap between management consulting and the delivery of IT solutions.
- the following sections cover the concepts behind the Enterprise Strategic IT Planning Framework Tower and the use of the framework components to provide strategic IT planning.
- planning continuum 1000 flows from management consulting 1002 through IT planning 1004 to delivery 1006 .
- business planning and transformation 1008 is performed in response to business context industry 1010 and common 1012 business models and business strategies such as a business transformation plan 1014 , business plan and architecture 1016 , and other business strategies 1018 .
- Information developed during the management consulting 1002 phase is used to drive enterprise IS/IT development 1020 in the IT planning 1004 phase.
- Enterprise IS/IT strategy development 1020 reacts to inputs from IS architecture industry 1022 and common 1024 models in order to drive enterprise IS/IT strategies 1026 . From strategy development and strategies themselves, an enterprise IS/IT architecture definition 1028 is determined based on IT architecture reference models 1030 .
- Enterprise IS/IT architecture definition 1028 aids in generating transition plans 1032 and enterprise IS/IT architectures 1034 in order to drive high level solutions development 1036 .
- High level solutions development 1036 is based on solution models 1038 and results in high level solutions 1040 and transition plans 1042 for their implementation.
- solutions and services delivery 1044 is performed based on components 1046 and templates 1048 .
- Deliverables include designs 1050 , code 1052 , and application systems 1054 .
- a maintenance function 1056 is set up for the deliverables.
- Strategic IT planning is the process of modeling and defining frameworks and architectures in support of the business and creating the plan(s) for implementing those frameworks and architectures.
- Strategic IT planning is defining, not designing.
- a strategic IT plan does not design systems, databases, or networks.
- the design and implementation work is initiated after the definition process has been completed. Based on this premise, a process for defining the frameworks and requisite architectures and their use is demonstrated.
- three things In order to convert the initiatives from an enterprise strategic business plan into manageable and implementable results, three things must occur. First, complexity is decomposed into manageable units. Second, architectures and frameworks are built that can be used to model the business and the enabling IT. Third, a common language is decided upon and used to articulate the frameworks and architectures.
- the enterprise is broken down into manageable entities or components. Just like an airplane can be decomposed into its separate parts using a bill of materials which is a list of products and specifications that describe the product elements, characteristics, and sometimes assembly requirements, the same can be done for an enterprise.
- a decomposed enterprise needs to be defined so it can be understood within the context of the whole and detailed enough to be analyzed for change, sourcing, and assembly, just like the bill of materials for an airplane. Not only does this enable various teams and organizations to develop processes for transforming inputs into outputs, but also better enables IT to support the transformation.
- enterprise models represent the common repository of data, information, and knowledge about the enterprise.
- the graphical representations precisely describe the enterprise in clear and understandable terms.
- the scope of the models is four dimensional considering functional activities within a department, cross-functional activities within the company, customer and supplier activities, and finally, competitor activities such as “time to market.” This holistic view and understanding enables IT alignment with the enterprise and its objectives and goals.
- a system can be further refined and broken into basically two parts: as a complex set of dissimilar elements or parts so connected or related as to form an organic whole, and the whole is greater than the sum of the parts; that is to say, the system has properties beyond those of the individual parts.
- the purpose of building systems is to acquire those properties provided by the whole.
- the essence of systems is relationships, interfaces, form, fit, and function. Therefore the essence of architecting is structuring, simplification, compromise, and balance. The challenge is in the control, if not the reduction of complexity and uncertainty, and this must be reflected in the architecture.
- an IT architecture can perhaps be best understood as a top-down description of the structure of the system. Therefore models can help in describing the structure.
- a model is an abstraction of what the participants think and hope the end system and its environment will look like.
- a model can communicate a wealth of information in a simple aggregated form.
- a model of a house is quickly understood by all parties, not only in its external shape, but also in its likely electrical, plumbing, and heating systems, its living space, and its relationship to its surroundings.
- the best architecture is based on the complete submission of the individual parts to the purpose or function of the whole. “Form follows function” becomes a guiding principle.
- Successful systems can be developed following an architecture that is driven by function instead of form. However it should be noted that successful architectures evolve slowly, and are not created with such detail that they stifle innovation. If an architecture is over defined, the builders will have no choice or flexibility other than to “build to print”. That is to say, with too much specificity the system developer or implementer will not have the option to improve or adjust the design to meet changing business environmental demands or technological change.
- An Enterprise Strategic IT Plan and its implementation will provide the framework and process for defining the vision, mission, and long term objectives for IT and aligning them with the business; define the strategies for achieving them, and define the architecture to enable them.
- the IT Plan also provides the context and guidance that drives the definition of integrated business and IT systems (in support of business processes and functions), organization structure, and IT solution sets for products and services.
- the IT Plan determines the actions and parameters for the allocation of resources to meet the objectives.
- the IT Plan allows for a deliberate, prioritized, planned, and effective utilization of an enterprise's investment in time and resources.
- strategic IT planning is the process of modeling and defining frameworks and architectures in support of the business and creating the plan for implementing those frameworks and architectures. It must be reemphasized that strategic IT planning is defining, not designing. Therefore, in order to define all of the necessary IT frameworks and architectures in a consistent and repeatable fashion and to insure that all of the mandatory and appropriate components of a comprehensive enterprise IT plan are present, a planning framework and model must be defined and used.
- the Enterprise Strategic IT Planning Framework Tower is the primary vehicle through which architectural information is communicated.
- the use of the Tower model, the concepts behind the makeup of the model, and the concept of the blueprints and work patterns that together can be used to produce strategic IT plans and technology architectures that support the business needs of a corporation will be demonstrated.
- the Tower is the starting point for determining the context and the foundation components and elements needed to build a strategic IT plan, enterprise architecture, architecture components, and enabling IT solutions and strategies for an enterprise.
- the components and elements identified in the Tower help planning practitioners to effectively analyze and evaluate technology requirements, put them in the proper business context, and ensure that due consideration is given to all of the business and technology components necessary to address and support business drivers and modernization requirements.
- the Tower also provides the baseline against which a business can measure their current environment and initiatives to ensure they are working with and within a comprehensive framework for the design, engineering, acquisition, and deployment of technology-enabled solutions to meet specific business goals.
- the specifications, or “building codes”, for some of the technical component architecture are found in a Technology Policy which covers the governance of standards and design guidelines.
- Tower blueprints dictate the assemblage of framework model components for the construction of desired deliverables such as a strategic IT plan.
- the framework components indicated in the blueprint are then incorporated into an approach and consequently processed through work patterns using various methodologies and techniques to produce a customized strategic IT plan, enterprise architectures, or other deliverables. It is in the work patterns that the prescription and execution of approaches, methodologies, processes, techniques, and tools for developing the specific deliverables are determined and take place.
- a suite of approaches and work patterns deliver strategic IT plans and other associated deliverables.
- the business architecture 32 In order to develop a comprehensive enterprise strategic IT plan and the requisite enterprise architecture 30 for an organization, two types of architectures must be considered together: the business architecture 32 and the information technology architecture 34 , as shown in FIG. 3. The combinations of these two elements make up the enterprise architecture to include an enterprise management framework 36 , as shown in FIG. 3 that allows for the management of the two architectures.
- the business architecture is the main driver for the IT architecture but the IT architecture can also have an impact on the construction of the business architecture through enablement or providing new and creative ways of conducting business, for example, the internet.
- the framework is built around the essential, mandatory components of an enterprise architecture and addresses people, processes, and technology.
- the decomposition of the enterprise architecture can be represented by a model made up of six fundamental components 40 , depicted as planes shown in FIG. 4 These components make up an enterprise architecture, and include both the business and IT architectures.
- Each plane represents a mandatory component in enterprise architecture 30 and must be addressed in a strategic IT plan.
- the intent of the planes is not to imply a sequential flow but to help easily identify and categorize requisite architectural components and their elements. However it should be understood that there are requisite relationships between components and elements though not depicted by this particular model.
- each component of the framework contains the requisite elements (sub-components). Addressing these elements not only makes each component complete, but also allows a “hard link” to be established to other components in the framework.
- the components contain everything deemed necessary for completeness—both on the business side as well as the IT side. The following is a high level overview of the content of the fundamental components:
- Strategic Plan(s) 41 Every enterprise should have at least six types of strategic plans: Business Plan, Product Plan, Financial Plan, Organization Plan, Marketing Plan, and IT Plan.
- the plans provide the context and guidance that drive the definition of business functions, processes, systems, and organization.
- Strategic business planning is the process of defining the mission and long-term objectives for the business and the strategies for achieving them.
- the IT plan defines and guides the technology enablement of the business and related plans. In both of these plans are the executable roadmaps for implementation and deployment of the plans.
- Business Architecture 42 reflects a view of what the business must do today as well as in the future to accomplish particular business requirements.
- the business architecture defines the business organization structure, IT investment and expenditure profile, functions, business process architectures (value streams), workflow scenarios, and the enterprise operating environment within which they all exist.
- Information Architecture 44 represents what information must be delivered to individuals across the enterprise to help them effectively execute the business processes and make informed decisions. This plane contains the information and data management framework and precepts, the business intelligence component processes, the geo-structural view of information specific technology deployment, and the information-application software portfolio.
- Application Architecture 46 serveses to support business process execution (value stream enablement) and bring information and data to the process.
- the application architecture defines the application software portfolio and integration relationships. Application inputs and outputs are identified as well as the application geo-structural view for deployment. Guiding principles, standards, and design characteristics support the acquisition as well as development and integration of applications.
- Technology Infrastructure Architecture 48 fines the IT components necessary to enable access to information and provide support for the execution of activities.
- This plane contains the standards and policies or “building codes” for technology infrastructure construction.
- This plane also contains a characterization of the target environment, and identification and views of the future geo-structural layouts with IT platform requirements and characteristics that will provide the basis for engineering blueprints.
- Enterprise IT Management architecture 49 deals with the business and organizational management of providing IT services and products, the management of the services, IT systems and network management, to include security, as well as element management. This layer also encompasses the enterprise IT management organization capabilities, competencies, skills and performance models necessary to implement the desired culture and behaviors.
- FIG. 5 shows the Tower model 500 and graphically depicts the decomposition of the mandatory components (depicted in gray) into sub-planes.
- a sub-plane is a convention to clarify and detail the element content of a mandatory component.
- a business architecture is typically composed of those elements associated with: an enterprise business operating environment, business support and line functions and organization structure, an enterprise business framework of architectures, and business process architectures (value streams) and workflow scenarios, hence four sub-planes.
- Tower model 500 includes the mandatory components and their sub-planes.
- For the strategic plan 41 component there may be a strategic business and IT plans 502 sub-plane.
- For the business architecture 42 component there may be enterprise business operating environment 504 , business support and line functions and organization structure 506 , enterprise business architecture framework 508 , and business process architecture and workflow scenarios 510 sub-planes.
- For information architecture 44 there may include information/data management framework and precepts 512 , business intelligence component processes 514 , geo-structural component view 516 , and information application software portfolio 518 sub-planes.
- Application architecture (value stream enablement) 520 , geo-structural component view 522 , and application software portfolio (systems integration matrix) 524 sub-planes may be a part of application architecture 46 .
- Standards and policies 526 , logical location software deployment schema 528 , operating and systems requirements and characteristics 530 , and geo-structural components view 532 sub-planes may be included in technology infrastructure architecture 48 .
- Enterprise IT management framework 49 component may include sub-planes of IT systems management framework 534 , IT systems management geo-structural components 536 , IT systems management application software portfolio 538 , and enterprise IT management organization model 540 .
- the following describes how the Enterprise Strategic IT Planning Framework Tower model is interpreted and consequently used to create a strategic IT plan.
- the systematic process of modeling the enterprise through the development of succinct business process and IT architecture models in support of an enterprise's business architecture is described in each description of the Tower model components.
- the enterprise business architecture is based on a framework comprised of a series of business process models that integrate the numerous business processes into a series of workflow activities that collectively are called value streams.
- the value streams produce specific results for a customer based on business goals, objectives, critical success factors, and performance metrics.
- the concept for strategic IT planning outlined in this section is based on the premise that there are six fundamental and mandatory enterprise architecture components in every enterprise.
- the six enterprise architecture components are developed to portray a strategic view of the business while identifying what and where enabling technology should be deployed within business processes.
- the architecture components are intrinsically linked and are mutually supportive of each other for modeling the enterprise.
- the six mandatory architecture components shown in the Enterprise Strategic IT Planning Tower model of FIG. 5 are: Strategic Plans, Business Architecture, Information Architecture, Application Architecture, Technology Infrastructure Architecture, and Enterprise IT Management Framework.
- the concepts and rationale behind each of the architecture component planes of the Enterprise Strategic IT Planning Framework Tower will be discussed and developed in the following sections.
- the reference models that are contained in each of the component layers are an “icon” or symbol shorthand that represent graphically a great deal of content that can be found in the methodologies, processes, industry models, and intellectual capital.
- the models in and of themselves are not as important as the implied content behind them.
- the models are only representative in nature and will vary for each enterprise as to depth and actual content. However, there are certain essential objectives of each model that must be satisfied and will be discussed for each model.
- An organization's business architecture for aligning IT with the business will be addressed.
- An information architecture for operational needs and establishing business intelligence within a corporation for managing itself, conducting economic analysis, and developing business scenarios for expansion or establishing new business activities for competing in the marketplace will be provided.
- An application architecture that enables and supports business processes (value streams), and ensures that the business operations within the corporation have been fully integrated and optimized for efficiency and effectiveness will be defined.
- a technology infrastructure architecture in support of the information, application, and enterprise IT system management architectures will be developed.
- An integrated enterprise system management approach and IT organization framework for ensuring the reliability, availability, and service consistency of a organization's enterprise information system in support of its business operations and services, including extensions to customers, partners, and suppliers will be defined.
- Strategic plans provide the context and guidance that drive the definition of business functions, processes, systems, and organization. Strategic plans define the mission and long range objectives for conducting the business, and the strategies for achieving them. In addition they determine the actions and allocation of resources to meet strategic objectives, allowing for the effective utilization of an organization's investment in time and resources. Each strategic plan serves a specific and useful function. Every enterprise should have at least six fundamental types of strategic plans—Business Plan, Product Plan, Financial Plan, Organization Plan, Marketing Plan, IT Plan
- Strategic business planning is the process of defining the mission and long-term objectives for the business enterprise and the strategies for achieving them.
- the strategic IT Plan defines and guides the IT enablement of the business and related plans.
- the executable roadmaps for implementation and deployment of the strategic plans would normally be found in a business transformation plan (part of the Business Plan) and an IT transition plan (part of a strategic IT Plan).
- Strategic plans provide the context and guidance that drive the definition of business operations, functions, processes, systems, and organization.
- Strategic business planning is the process of defining the mission and long-term objectives for the business enterprise and the strategies for achieving them.
- the strategic business plan consists of the following essential elements: vision, objectives, critical success factors, integrated business strategy, market assessment, products and services, operating principles, distribution channels, operation, organization, science and technology strategy, modernization drivers, information management precepts, technology guiding principles; financial strategy, business transformation plan,
- the strategic IT Plan defines and guides the IT enablement of the business and related plans.
- the executable roadmaps for implementation and deployment of the strategic plans would normally be found in a business transformation plan (part of the Business Plan) and an IT transition plan (part of a strategic IT Plan).
- An organization's business architecture is formulated in support of the enterprise strategic business plan(s) by developing enterprise value streams of “How a Corporation Wants to Operate in the Future”, and what factors must be considered. It is from the business plans and business environments that the IT drivers are derived and the corporate direction is indicated.
- a Business Architecture reflects an enterprise view of what the business must do today as well as in the future to accomplish particular business requirements. This view is based on the business context and the guidance provided by strategic business plans.
- the business architecture defines the business organization structure, IT investment and expenditure profile, functions, business process architectures (value streams), workflow scenarios, and the enterprise operating environment within which they all exist. It is the business context and business architecture that will provide the rationale for the future enterprise IT architecture baseline and development.
- the business architecture provides an operational overview of the enterprise business functions and their supporting processes (value streams).
- the business architecture will be used for understanding and assessing the business processes to effectively identify how information technology can enable an enterprise to meet its business objectives.
- the enterprise business operating environment provides a high level overview of the environment for designing an enterprise business and IT architecture. This characterization allows for designing the logical enterprise business and IT architectures and understanding the enterprise information and systems environment, defining the geographical requirements for the information, application, infrastructure, and IT systems management architectures, and developing a business and information technology alignment perspective
- the Business Architecture identifies the drivers for making IT decisions, captures the primary line and support functions and business processes for aligning the enterprise business and IT towards reaching its strategic purpose, identifies the necessary business process architectures (value streams), and workflow scenarios from which the technology requirements and architectures to support them can be derived, and provides the basis for developing the enterprise logical location software deployment schemas and models.
- the Business Architecture also provides an overview of the integration required to effectively support the business processes across the enterprise, provides a high-level framework and mechanism for consistently displaying information, application, and infrastructure architecture information in logical location views, defines the models for business critical actions such as facilitating change management and providing a framework for process integration, and presents a geographical view of the logical and physical locations and the relative functions needed to determine the business and logical organizational structure to meet corporate goals and objectives
- An organization's business architecture is formulated in support of the enterprise strategic business plan(s).
- IT planning purposes it is the compilation of essential information about the business that will be the basis for defining how information and technology will be used to support that business.
- a business environment 600 within which the enterprise operates as shown in FIG. 6, as an example, is impacted by outside influences. Therefore, these external factors affecting the business must be understood. These influences include the type of markets 602 the business is in or wishes to enter, competitors 604 faced in markets 602 , government legislation 605 and regulations 606 with which to abide by, parameters placed upon it by a parent corporation 608 or the impact it might have by subsidiaries 610 , services to provide to its customers 612 , and accounting to its partners 614 .
- Inside influences include production of goods, sales, and administration of the corporation 616 . In the development of a comprehensive IT plan these factors could preclude certain choices in the technology selection.
- the operating framework can be represented by a Business Function/Process Model 700 shown in FIG. 7.
- Model 700 articulates a firm's loose organizational structure and the line business functions and supporting business processes. It allows for a summary view to facilitate an understanding of the relevant functions in the current as well as future enterprise, identifying the existing and potential sources for competitive differentiation and advantage, and provides a way of focusing on areas that could benefit from strategic analysis.
- the essential objective of model 700 is to depict the current functional view of the enterprise by illustrating the primary line functions, which directly relate to the delivery of the enterprises products and services (e.g. Sales 712 , Distribution and Delivery 716 ) and the supporting functions, which enable the primary functionality (e.g. 706 Finance).
- model 700 a manufacturing company may have different departments to include support functions of manufacturing 702 , corporate administration 704 , finance 706 , and information technology 708 .
- Primary line function examples include business development 710 , marketing and sales 712 , customer care 714 , and distribution and delivery 716 .
- manufacturing support function 702 there may be sections of material management 720 , plant production 722 , quality management 724 , inventory management 726 , design and engineering 728 , and plant maintenance 729 .
- sections may include human resources 730 , legal, 732 , professional development 734 , mergers and acquisitions 736 , policies and procedures 738 , and auditing 739 .
- Sections under the finance is support function 706 may include corporate accounting 740 , treasury 742 , asset management 744 , risk management 746 , and financial management 748 .
- Under the information technology support function 708 there may be sections of IT business management 750 , service management 751 , systems/network management 752 , element management 753 , security management 754 , telecommuting 756 , and paging management 758 .
- business development 710 may contain marketing development 760 , product/services development 762 , and business planning 764 .
- Sections under the marketing and sales line function 712 may include advertising management 770 , marketing management 772 , and sales force management 774 , literature 776 , and promotions 778 .
- For the customer care line function 714 , sales 780 , services 782 , complaints 784 , systems restoral 786 , suggestion management 788 , and technical information 789 groups may be provided.
- Sections under distribution and delivery 716 may include products 790 , field services 792 , and operations management 794 .
- the operating environment also reflects a view of the logical and physical operating environment 800 shown in FIG. 8 within which an enterprise exists and operates.
- Operating environment 800 illustrates an example of how the components of Business Function and Process Model 700 may be separated by geographical as well as logical boundaries. This environment will have a direct bearing on the design, engineering, implementation and deployment of IT.
- the identification of logical business locations defines the various areas of business activity encompassed by the enterprise.
- the separation between logical locations may be physical (such as geographic boundaries), or purely logical (such as organizational, cultural, and political boundaries).
- the definition of logical business locations provides a key ingredient for analyzing IT resource needs and determining the design, implementation, deployment, and management of those resources throughout the enterprise.
- This view provides input into the distribution of applications as well as the information and infrastructure requirements for the definition of those architectures.
- a logical location map 802 provides the necessary correlation between logical and physical locations for the various business functions of the enterprise.
- An operations and support systems center 902 provides communication among mobile users 904 , sales offices 906 , manufacture operating units 908 , customer service centers 910 , regional offices 912 , and teaming partners 914 .
- Operations and support systems center 902 has access capability to corporate data stores 916 , operational data stores 918 , and corporate headquarters 920 .
- the specific content in the individual figures are only representative in nature and will vary for each enterprise.
- An IT investment profile 1000 example shown in FIG. 10 reflects the company's overall investment in IT and where it is focused. To some degree, profile 1000 illustrates the perceived value the enterprise places on IT. Investment and expenditure profile 1000 provides a view of the monetary delimiters on the IT operating environment and sets the tone and expectations for future IT expenditure. This will directly impact the feasibility of certain technology choices and recommended IT initiatives to reach targeted architectures and environment.
- FIG. 11 shows an example of a client IT expenditure and industry expenditure benchmark 1100 . It also provides a way in which to determine client standing in regards to an industry norm benchmark for business, competitive, and industry measures.
- the enterprise business architecture is key to the business success of a corporation as well as the development of effective strategic IT plans. From the strategic business models articulating the business process architectures (value streams) the requisite enabling technology and information requirements can be derived. The level of detail and accuracy applied to these models will directly impact the robustness of the IT plans that can be developed for an enterprise as well as the success of their subsequent implementation.
- the business architecture is represented by an enterprise model 1200 that shows the essential elements of primary external business processes 1295 and the respective inputs 1230 from and outputs 1208 to external sources 1204 .
- the frame 1202 in the middle of the model represents the client enterprise. This model is an example of a manufacturing industry enterprise and the specific content in the individual figures are only representative in nature and will vary for each enterprise.
- Enterprise frame 1202 handles various inputs and provides various outputs for interfacing with external processes.
- An enterprise frame 1202 may create such elements as business leads 1206 , literature 1208 , discount agreements 1210 , request for quote responses 1212 , quotes 1214 , orders, 1216 , customer invoices 1218 , fulfilled orders 1220 , fulfilled customer requests 1222 , complaint resolution 1224 , packaging material 1226 , and rejected requests 1228 as inputs to customer process 1204 .
- customer process 1204 may create elements such as business leads 1206 , request for quote requests 1230 , customer information 1232 , orders 1216 , customer payments 1234 , and returned items 1238 as inputs to enterprise frame 1202 .
- Enterprise frame 1202 may receive inputs from a human resources services process 1240 for such items as interested candidates 1242 and employment development services 1244 .
- a government services process 1246 may create items such as Environmental Protection Agency guidelines 1248 , Occupational Safety and Health Administration (OSHA) guidelines 1250 , and government policies and regulations 1252 for input to enterprise frame 1202 .
- Other processes of the aggregate input/output model 1200 include an employee support process 1254 that may receive compensation 1256 , benefits 1258 , employee information 1260 , and reimbursements 1262 inputs generated by enterprise frame 1202 while creating reimbursement requests 1264 and other employee issues 1260 for processing by enterprise frame 1202 .
- a supply goods and services process 1266 creates manufacturing material 1268 , supplier capacity and availability 1270 , goods 1272 , and vendor invoice 1274 inputs to enterprise frame 1202 while responding to vendor payment 1276 and purchase order 1278 inputs created by enterprise frame 1202 .
- a settle payments process 1279 handles electronic funds transfer payments 1280 and foreign currency wire request inputs 1281 generated by enterprise frame 1202 and provides electronic funds transfer remit 1282 and foreign currency wire remit advices 1283 to enterprise frame 1202 .
- a legal action process 1284 handles closed case 1285 and implemented policy and regulation 1286 issues and generates legal issues 1287 .
- a strategic services process 1288 issues science and technology drivers 1289 , industry trends 1290 , and external market 1291 data to enterprise frame 1202 for strategic planning consideration.
- An authorize credit process 1292 responds to credit check requests 1293 with credit check responses 1294 .
- a credit analysis process 1295 responds to credit analysis requests 1296 with credit analysis responses 1297 .
- a value stream can be defined as an end-to-end array of activities that collectively create a valuable result for both internal and external customers.
- the value streams reconcile all the views a customer may have of the enterprise and create the views of a single, serving enterprise dedicated to the customer.
- the value streams satisfy the customer wishes as fully as possible, rather than focusing on internal procedures (or functions) such as accounting or selling or shipping.
- FIGS. 13 A- 13 D represent a model 1300 of the aggregation of the processes within a particular category (e.g. Customer Facing) and the external inputs and outputs to support the value streams.
- This view shows not only the integration within a category but depicts the required inputs and outputs from the other categories within the enterprise as well as sources outside the enterprise such as enable customer process 1204 of FIGS. 12 A- 12 C.
- the elliptical elements such as fulfilled order 1220 represent tangible objects.
- the hard cornered or rectangular objects such as customer invoice 1218 represent IT objects exchanged with other value streams or external entities.
- the specific content in the individual figures are only representative in nature and will vary for each enterprise.
- FIGS. 13 A- 13 D enable customer process 1204 of FIGS. 12 A- 12 C is shown with its inputs and outputs interacting with both internal and external processes, such as order to cash process 1302 and credit analysis process 1295 .
- An order to cash process 1302 generates customer invoices 1218 and quotes 1214 for enable customer process 1204 and generates credit check requests 1293 for authorize credit process 1292 .
- Order to cash process 1302 also generates receivable debit entries 1304 and receivable credit entries 1306 as well as work orders 1308 for input to a manufacturing to distribution process 1310 .
- Order to cash process 1302 handles credit check responses 1294 from authorize credit process 1292 along with orders 1216 and customer payments 1234 from customer process 1204 .
- Order to cash process 1302 also handles Availability to Promise ATP data 1312 , scheduled ship date 1314 , advanced ship notice 1316 , advice of receipt 1318 , and proof of delivery 1320 inputs generated by manufacturing to distribution process 1310 .
- Manufacturing to distribution process 1310 generates engineering change reports 1322 , manufacturing material demands 1324 , and receipt acknowledgments 1326 along with handling manufacturing material 1328 and technical manual 1330 inputs.
- Service request process 1332 generates orders 1216 , fulfilled customer requests 1222 , complaint resolution 1224 , packaging material 1226 , and rejected request 1228 inputs to customer process 1204 .
- Service request process 1332 handles fulfilled order 1220 , customer request 1236 and returned item 1238 inputs generated by customer process 1204 .
- Service request process 1332 also generates credit memos 1336 and debit memos 1338 .
- Service request process 1332 generates field service reports 1340 for use by order to cash process 1302 .
- a complaint 1342 input is generated by service request process 1332 for processing by manufacturing to distribution process 1310 .
- Complaint 1342 and a business lead 1344 input are generated by service request process 1332 for use by prospective customer process 1346 .
- Prospective customer process 1346 handles business leads 1206 and request for quote requests 1230 from customer process 1204 .
- Prospective customer process 1346 generates business leads 1206 , literature 1208 , discount agreements 1210 , request for quote responses 1212 , customer interfaces 1232 , and quote 1214 inputs for processing by customer process 1204 .
- Prospective customer process 1346 interfaces with credit analysis process 1295 through credit analysis requests 1296 and credit analysis responses 1297 .
- Prospective customer process 1346 responds to marketing strategy 1348 , pricing strategy 1350 , and buying trend 1352 information.
- An engineering change order notification 1354 provides input to prospective customer process 1346 and manufacturing to distribution process 1310 .
- a product configuration 1356 drives prospective customer process 1346 , manufacturing to distribution process 1310 , and. order to cash process 1302 .
- Prospective customer process 1346 also generates a customer profile 1358 for use by order to cash process 1302 .
- each of the value streams identified in the enterprise business architecture is further decomposed into event, process, and environment architectures and workflow scenario models.
- the event models illustrate the activities that happen outside the Enterprise/Value Stream to which the value stream must react in a predetermined manner.
- the architecture models depict the style and method of design and construction that comprises the elements of a system and defines the purpose and interrelationships of those elements.
- Each value stream is depicted with at least one process architecture and an environment model.
- the workflow scenario models illustrate the sequence of activities necessary to transform the inputs into the required outputs.
- FIGS. 14 A- 14 B represent an example of a generic event model 1400 for a value stream such as “Order to Cash”. This concept requires that for each value stream identified in the enterprise business architecture there will be a corresponding event model.
- the event model articulates each event that triggers a workflow scenario within the value stream.
- the value stream event metrics matrices capture the number of events that occur over some specified time periods. These events could be either external or internal to the enterprise. For each event identified in the model a logical location software deployment schema will be derived.
- the fulfill order scenario 1401 is initiated by various events including customer cruising the web site 1402 , customer placing order 1404 , and credit authority responds to credit check request 1406 , all of which are external events.
- Time to invoice the customer 1408 is an example of an internal event.
- Other internal events include time to invoice customer 1408 , and customer makes payment 1410 , order entry sends order to manufacturing 1412 .
- field service repair orders replacement parts 1414 submits billing inputs 1415 , shipping provides proof of delivery 1416 , advice of receipt 1418 , and Advance Ship Notice (ASN) 1420 as well as operations updates to ship date 1422 and ATP 1424 to assist in keeping track of the order.
- ASN Advance Ship Notice
- the maintain/change order scenario 1550 is driven by the customer changing an order 1426 or canceling an order 1428 .
- Authorization to refund an order for fulfill refund scenario 1514 is given by customer service 1430 .
- a review order scenario 1432 processes a customer's review request 1434 .
- the specific content in the individual figures are only representative in nature and will vary for each enterprise.
- FIG. 15 represents an example of a generic process architecture 1500 for a value stream such as “Order to Cash”. This concept requires that for each value stream identified in the enterprise architecture there will be at least one corresponding process architecture. These architectures provide the structure within which workflow scenario models can be derived depicting various business scenarios for that value stream.
- the essential elements are the work elements being executed as represented by fulfill order scenario 1401 and the information being created and used as represented by new order request 1522 .
- a fulfill order scenario 1401 may process field service billing input 1340 , product configuration 1356 , customer profile 1358 , advanced ship notice 1316 , advice of receipt 1318 , proof of delivery 1320 , customer payment 1234 , credit check responses 1294 , and ATP data 1312 inputs and generates scheduled ship date 1314 , customer invoice 1218 , credit check request 1293 , quote 1214 , and an order release 1504 .
- Customer data to consumer intelligence process 1503 drives the information for customer profile 1358 .
- An order 1216 is generated by fulfill order scenario 1401 .
- Order 1216 includes information with respect to an order such as being entered 1506 , released 1508 , invoiced 1510 , and paid 1512 .
- Order 1216 may be generated by fulfill refund scenario 1514 that can create a credit refund 1516 or a customer credit memo 1518 .
- Fulfill refund scenario 1514 is triggered upon an indication by approved refund/return 1520 .
- An order 1216 is initiated by fulfill order scenario 1401 in response to a new order request 1522 generated by a direct order request scenario 1524 .
- Direct order request scenario 1524 receives information from an order request generated by phone 1528 , fax 1530 , or web page 1532 from a customer 1534 , CSR 1536 , account executive 1538 , or FSR 1540 .
- Direct order request scenario 1524 may generate a review order request 1542 that initiates a review order scenario 1544 that receives information from order 1216 in order to generate order information 1546 .
- Direct order request scenario 1524 may also generate a maintain/change order request 1548 that provides information to a maintain/change order scenario 1550 in order to perform any alteration to order 1216 .
- Direct order request scenario 1524 also generates a return request 1550 for use by fulfill refund scenario 1514 .
- the specific content in the individual figures are only representative in nature and will vary for each enterprise.
- the environment model 1600 for a value stream depicts the interaction with external entities, as indicated with the darkened hourglass figures, as well as the interfaces with the other value streams of the enterprise.
- the elliptical spheres in this model represent physical, real world objects.
- the rectangular or “hard cornered” shapes represent IT objects and therefore integration points between the value streams as well as external entities.
- These interface objects are the “whats” that are reflected in the Enterprise Information/Application/Systems Management Software Portfolio integration matrices.
- FIG. 16 shows an overall environment view for the order to cash example as discussed above.
- the workflow model 1700 depicts one of the workflow scenarios based on the process architecture. There could be several workflow scenarios for each process architecture and the number of workflow scenarios is directly linked to the events identified in the associated value stream event model. The workflow scenarios actually depict the sequence of activities necessary to transform the inputs into the required outputs. From these granular models, most of the requisite inputs and outputs for the enterprise will be defined as well as the logical applications (either physical or IT) that support the accomplishment of the particular workflow. From these models, the basis for the application portfolios and information architectures are derived. Therefore these models will support the construction and provide the rationale for the IT architectures (e.g. application portfolios) developed in the an enterprise IT Plan.
- IT architectures e.g. application portfolios
- An Information Architecture represents what information must be delivered to individuals across the enterprise to help them effectively execute business processes and make informed decisions.
- the information architecture plane in the Tower contains the information and data management framework and precepts; the models for the integrated information, application, and systems management architectures; the geo-structural technology components view; and the information-applications software portfolio that address business intelligence scenarios.
- the information architecture is the cornerstone of an organization's ability to effectively manage information. This capability is critical to the discovery and exploration of information related to the critical factors and trends of a business and its industry.
- the Information Architecture provides focus on the operation of business processes and their interaction with other business functions and processes (value streams) within the enterprise, provides the ability to continually evaluate business performance and productivity and readily identify business directions for ensuring achievement of business goals, objectives, critical success factors, and performance metrics, and provides business intelligence and value-added information for strategic decision making.
- the Information Architecture also effectively consolidates both macro and micro information requirements and perspectives of the organization to insure information and data integrity and helps assure compatibility between informational and operational transaction systems.
- a corporation's enterprise information architecture for enabling business intelligence is characterized by a framework that establishes decision making principles, precepts, and standards for the identification and use of information as a business resource, identifies the business intelligence scenarios within business value streams, identifying the high-level inputs and outputs, occurring in the enterprise from internal to external sources, to include those being generated by both legacy and client/server systems.
- the framework includes a data warehouse structure that provides the necessary high-level management and operations reports.
- the framework facilitates the establishment of the underlying infrastructure for managing the information asset by highlighting the required information databases and information-application components, provides a supporting application portfolio and system integration table for identifying the business intelligence applications and integration requirements, and provides a geo-structural view for relating the information and data architectural components to their corresponding logical and physical locations
- FIG. 18 shows an information and data management framework and precepts 1800 of the enterprise.
- the definition of an enterprise's information architecture includes several views that describe the information needs and uses, its owners and users and management, the forms the information is stored in and the information sources.
- the information and data management framework establishes decision making principles, precepts, and standards for the identification and use of information as a business resource. Also part of the framework is understanding the informational needs of the operational (tactical) side and the informational (strategic) side.
- information needs and uses 1802 of the enterprise is driven by decision support 1804 , business alignment 1806 , and operations support 1808 .
- Information management 1810 is controlled through knowledge management 1812 , access management 1814 , and storage management 1816 .
- Information sources 1818 include internal sources 1820 as well as external sources 1822 .
- FIG. 19 shows an example of business intelligence scenarios 1900 for the enterprise.
- an enterprise information architecture is required for providing business intelligence on both the internal and external business environment.
- This architecture should enable a business to explore sales, profit, forecasts, and what-if information.
- the information requirements (inputs and outputs and the relationships with other applications as well as value stream requirements) are identified and articulated in the enterprise strategic business models found in the enterprise business architecture.
- the business intelligence scenarios can be designed to allow the empowerment of information-based employees throughout the enterprise. They can provide them with the ability to analyze the operations and performance of the business in accordance with established policies and rules. From available information employees should be able to identify trends within and without the enterprise and determine the required changes in response.
- FIG. 20 provides an example of a geo-structural component view 2000 .
- This view maps the information and database components of the enterprise to the pertinent business functions of the firm.
- the geo-structural view shows the logical location of the information and data architecture components that must be integrated and supported by a technical infrastructure. This layout will be used to develop a supporting logical technology infrastructure architecture.
- Enterprise data warehouse 2002 may include a data query and reporting function 2004 , a DSS/EIS 2006 , a database management system 2008 , a data mining function 2010 , a metadata function 2012 , a replicate function 2014 , a data administration 2016 , and a data processor 2018 .
- Enterprise data warehouse 2002 has access to operational databases 2020 , either internal corporate data stores 2022 or external operational data stores 2024 , over networks 2026 .
- Information is exchanged over networks 2028 by enterprise data warehouse 2002 with corporate headquarters 2030 , mobile/small office users 2032 , and regional/customer support/sales large office 2034 workstations.
- a regional data mart 2036 may support large office communications.
- an enterprise information and data technology data warehouse framework is formulated that identifies all the business transactions that are occurring within the enterprise from both internal and external sources.
- the architecture identifies all of the pertinent high-level management and operations reports. This framework is oriented around the transaction and information components required to develop a data warehouse capability and enabling business intelligence within a corporation.
- FIG. 21 provides an example of a data warehouse framework 2100 .
- enterprise data warehouse 2002 operates around database management system 2008 that processes data to and from internal corporate data stores 2022 and external operational data stores 2024 .
- Data processor 2018 performs data extraction and scrubbing between database management system 2008 and data stores 2022 and 2024 .
- Database management system 2008 interfaces with metadata 2012 and data administration 2016 in order to execute DSS/EIS 2006 , replicate 2014 , and data mining 2010 applications.
- FIG. 22 provides an example of an enterprise information application portfolio and system integration matrix 2200 .
- This matrix identifies for each of the value streams the enabling application components that should be integrated and is derived from the business process architectures and workflow scenarios. This matrix will also be found in the application architecture and enterprise IT systems management architecture because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident.
- An Application Architecture serves to support business process execution (value stream enablement) and bring information and data to the process.
- the application architecture defines the application software portfolio and integration relationships.
- Application inputs and outputs are identified as well as the application geo-structural view for deployment. Guiding principles, standards, and design characteristics support the acquisition as well as development of applications.
- the application portfolio is designed to illustrate the optimum distribution of applications and components across multiple business functions, processes, sites and platforms for enabling business workflow scenarios that will insure efficient and effective business operations.
- the Application Architecture identifies the appropriate enterprise business applications and the integrating requirements to support the business process architecture (value streams) and workflow scenarios, provides a means to incorporate business policies, processes, procedures, and rules to effectively operate and manage the enterprise, provides an organization the ability to streamline and integrate the operation and management of its business processes, and identifies the application portfolio and technology infrastructure requirements.
- an enabling application portfolio and architecture is required for performing business operations.
- the application architecture identifies the logical applications required for optimizing business operations and the logical locations of those enabling applications.
- An enterprise application architecture consists of a portfolio of applications that enable the value streams and associated workflow scenarios.
- the application architecture addresses the combination of functional software applications that must be integrated to enable the business process value streams and the workflow scenarios outlined in the business architecture.
- the integrated application portfolio should empower the information-based employees within the company to manage the day-to-day operations of the enterprise, and allow management and business analysts to concentrate on analyzing and operating the business.
- a corporation's enterprise application architecture will be characterized by the required application components for enabling the enterprise value streams, a geo-structural view for relating the application architectural components to their corresponding logical and physical locations and organizational structures, and integration requirements for applications.
- FIG. 23 provides an example of the application architecture 2300 for order to cash. This view correlates the required logical application inputs and outputs to the value streams they support. Based on the required logical applications, an enterprise application software portfolio table is formulated to show the applications that must be integrated.
- FIGS. 24 A- 24 B provide an example of geo-structural view 2400 for a generic manufacturing company. This geo-structural view shows the logical location of the logical application portfolio components that must be integrated through a technical infrastructure in order to form the required, integrated, corporate enterprise business system.
- FIGS. 24 A- 24 B applications for an enterprise are supervised by an enterprise server farm 2402 .
- Enterprise server farm 2402 includes servers for service management 2404 , sales and marketing 2406 , financial accounting 2408 , product planning 2410 , material management 2412 , asset management 2414 , logistics and distribution management 2416 , QA/QC/QM management 2418 , human resources 2420 , complaint management 2422 , legal and safety 2424 , corporate management 2426 , office automation 2428 , web 2430 and others 2432 .
- An external request processor 2434 handles server access to internal corporate data stores through enterprise data warehouse 2002 , regional data mart 2036 , and internal databases 2022 .
- External request processor 2434 may also provide server access to external databases 2024 and external client workstations 2436 .
- An internal request processor 2438 provides server access to client work stations at large regional/sales offices 2034 , mobile/small users and offices 2032 , and corporate headquarters 2030 either directly or through an office application server 2440 .
- Office application server 2440 may include print 2442 , file 2444 , post office 2446 , and office automation 2448 functions.
- Client workstations may include workflow/collaboration replication 2450 , application presentation 2452 , and web applications 2454 capabilities.
- FIG. 25 provides an example of a template 2500 for capturing an enterprise application portfolio.
- This matrix is derived from the business process architectures and workflow scenarios. This matrix will also be found in the information architecture and enterprise IT systems management architecture because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident.
- a corresponding application portfolio “best practices” recommendations table can be developed that highlights “best of breed” products.
- PIPE or a similar process is the logical extension of making integrated technology recommendations.
- FIG. 26 provides an example of a recommendations table 2600 that could be derived that highlights the “best of breed” products for enabling business processes.
- a Technology Infrastructure Architecture enables access to information and provides support for the execution of activities.
- This plane contains the standards and policies or “building codes” for infrastructure construction.
- This plane also contains the logical location software deployment schemas as well as a characterization of the infrastructure environment to provide the base line for the target environment. It also provides identification and views of the future geo-structural layouts with IT platform operating requirements and characteristics that will provide the basis for engineering blueprints and deployment.
- the enterprise technology infrastructure architecture provides the technology structure to support the information, application, and enterprise IT systems management architectures.
- the infrastructure architecture describes the underlying systems and associated platforms to integrate the business intelligence and business application portfolios into an enterprise information system.
- the Technology Infrastructure Architecture provides the supporting platforms and technology structure for information-empowered employees (e.g. business analysts, knowledge-based marketing and sales agents, operations and support system managers, and corporate executives) within an enterprise.
- the Technology Infrastructure Architecture also produces the technical structure for a seamless flow of information throughout the business enterprise to support enabling business processes, helps leverage economies-of-scale for IT procurement, improves the quality and efficiency of IT support, and eases integration efforts through technical consistency.
- an underlying technical infrastructure architecture In support of the information and application architectures, and IT system management framework, an underlying technical infrastructure architecture must be defined.
- the infrastructure architecture addresses the systems and networking structures that support the application portfolios that enable the value streams and workflow scenarios outlined in the business architecture.
- the infrastructure framework allows common and consistent operating environments to be established.
- the infrastructure architecture identifies and graphically depicts the underlying networking structures and associated platforms, operating systems, and protocols that enable the information, application and systems-management systems.
- the technical infrastructure architecture is characterized by highlighting in the corporation's enterprise infrastructure view the required system components for enabling the value streams and ensuring effective and efficient performance of these systems, establishing a common operating environment that will standardize operating practices throughout the enterprise and allow for ease-of-use and ease-of-training of end users, and developing a supporting Technical Infrastructure “Best Practices” Recommendations table or process that highlights the “best of breed” products for integrating the firm's enterprise information systems that allow for optimizing and controlling costs.
- a technology policy based on The Open Group Architectural Framework (TOGAF) model, (see the technical reference model 2700 in FIG. 27) is a vehicle to articulate consensus and provide a basis so that those involved in making decisions concerning acquisition and application of various technologies will have adequate and appropriate information on which to base their decisions.
- Technology policies provide guidelines on which technologies to use and which to avoid and recommends specific tools, vendors, or systems when appropriate, and establish a common operating environment that will standardize operating practices throughout the enterprise and allow for ease-of-use and ease-of-training of end users.
- a technology policy will be characterized by providing an overview of each technology, making statements of policy concerning the specified technologies and provides details on the components involved, providing a time frame for the deployment of recommended technologies, providing guidelines for decisions or recommendations of specific tools, and documenting current views on technology and communicating a consistent technology direction.
- Technical reference model 2700 includes application software 2702 that executes on application platform services 2704 through an application programming interface 2706 .
- Application platform services 2704 encompasses items such as data interchange 2708 , data management 2710 , distributed computing 2712 , graphics and imaging 2714 , international operation 2716 , network 2718 , operating system 2720 , transaction processing 2722 , user interface 2724 , security 2726 , and system and network management 2728 .
- Access to applications platform services 2704 is provided to communications 2730 , information exchange 2732 , and users 2734 of an external environment through an external environment interface 2736 .
- a Primary Integrated Platform Environment (PIPE) framework 2740 includes PIPE applications for desktop 2742 , workstation 2744 , workgroup/campus server 2746 , enterprise server 2748 , and mainframe server 2750 . Structures for the PIPE framework 2740 include applications development 2752 , systems management 2754 , and network management 2756 .
- PIPE Primary Integrated Platform Environment
- the logical location connectivity model depicted in FIG. 28 connects the logical locations identified in the business architecture with the input media for each event found in the value stream event model to the logical application software identified in the application architecture.
- connectivity model 2800 is separated into logical locations 2802 , event medium 2804 , application portfolio 2806 , and technology infrastructure 2808 .
- Logical locations include mobile users 2810 , customers 2812 , customer service 2814 , corporate headquarters 2816 , regional offices 2818 , field sites 2820 , warehouses 2822 , manufacturing plants 2824 , and partners/providers/suppliers 2826 .
- Event medium 2804 includes laptop computers 2830 to allow mobile users access to application portfolio 2806 through a public switched network 2832 .
- Customers 2812 gain access to application portfolio 2804 via public switched network 2832 using telephones 2834 and by fax 2836 .
- Customers 2812 may also be given access via an internet network 2838 using a workstation 2840 .
- Access to application portfolio 2806 for other logical locations 2802 may be through workstations 2842 or an extranet connection 2844 .
- Logical locations 2802 access specific applications in the application portfolio 2806 dependent upon the triggering event in the value stream.
- Applications within application portfolio 2806 may include enable service management 2850 , enable call management 2852 , enable fax management 2854 , enable web management 2856 , enable product configuration 2858 , enable enterprise corporate management 2860 , enable order entry 2862 , enable logistics 2864 , enable scheduling 2866 , enable manufacturing 2868 , and enable accounts receivables 2870 .
- Content and supervision of application portfolio 2806 is performed by corporate networks 2872 in conjunction with a security component 2874 and enterprise departments 2876 in technology infrastructure 2808 .
- the logical location connectivity model is created for each value stream. Aggregation of these models is accomplished by mapping the logical applications identified for each logical location into the matrix 2900 in FIG. 29.
- the logical applications are grouped into logical software components equivalent to software that can be readily obtained as commercial off the shelf. These logical software components set the initial basis for the software deployment over a geographical or logical area. By taking the individual logical location entries found in FIG. 29 and modeling each instance, as shown in FIG. 30, the engineering premise begins to emerge that upon consolidation gives the technology infrastructure geo-structural component view.
- FIG. 30 modeling of a simplified logical software deployment 3000 for a mobile user 2810 is shown.
- Mobile user 2810 may interface with customers 2812 , which would require access to specific software applications within the enterprise.
- Mobile user 2810 gains access to logical software components through laptop computer 2830 or other workstation and corporate networks 2872 .
- Logical software components may include security 2874 , enterprise information technology management 3002 , office automation 3004 , enterprise customer management 3006 , human resources 3008 , sales force automation 3010 , and other enterprise components 3012 .
- FIGS. 31 and 31A- 31 D provide an example of a technical infrastructure logical/physical view 3100 .
- This view correlates the required system components and infrastructure requirements of the enterprise for enabling the value streams and workflow scenarios to the logical location maps and templates from the business architecture plane.
- the lower level technology component architectures e.g. internet
- the logical location software models and the consolidated technology infrastructure architectures identify the logical applications that need to integrate and operate together, portray the enabling operational elements, processes and technology components for achieving the desired operating results based on the organization's business goals, objectives, critical success factors, and performance metrics, and highlight the system integration requirements in support of the information, application, systems management, and infrastructure architectures.
- FIG. 32 provides an example and might be derived from a process like PIPE and directed by the technology policy.
- the product recommendations are not considered to be part of the Tower but are depicted here to illustrate how they might be derived for a particular enterprise.
- the Enterprise IT Management Framework outlines the operational and business management of providing IT resources.
- the Framework consists of guidelines to manage the client relationships, the management of services, establishing an application selection and development process, and identifying approaches for systems and network management, and systems element management.
- An enterprise IT management framework provides for the exchange of IT systems management information with information technology systems and services within a corporation's enterprise. Additionally it provides the structure to define optimum value to the client by defining demand, products and services, fulfillment of demand, and the planning and managing of all aspects of IT.
- the IT systems management framework ensures the reliability, availability and serviceability of information services and systems. This architecture allows a corporation to plan, monitor, and manage enterprise information technology resources in a consistent manner. These resources include people, heterogeneous networks, communications systems, servers, desktops, applications, and databases.
- the Enterprise IT Management Framework helps to manage the resources of the IT business relationships with the client and external service suppliers or operating partners and monitors, manages, and addresses the actual delivery of the enabling IT services to the client and any partners.
- the Enterprise IT Management Framework ensures high availability of information technology services.
- the Enterprise IT Management Framework provides the IT network and system management capability to monitor, manage, and maintain the efficient and effective performance of the enterprise information system and its supporting communications networks.
- the Enterprise IT Management Framework also monitors and manages the availability and operational status of critical elements, components, and devices within the enterprise information system in a consistent, continuous and constant manner.
- the enterprise systems management structure will assure that IT services will be defined accurately and delivered in a dependable manner.
- the architectural framework discussed within this section outlines an enterprise systems management capability for ensuring the reliability, availability, and serviceability of a corporation's enterprise information system. The successful planning and execution of this framework will provide significant value to the enterprise by utilizing IT to enable business processes and allow more effective decision making.
- the IT systems management framework is created to support a corporation's information, application, and infrastructure architectures, as well as the services the IT organization provides.
- the ITU-T Systems Management Business Model shown in FIG. 33 outlines the functional areas that IT management must perform well to effectively become a business partner with their client. This model will help to define the processes to allow IT to become an integral and valued component of the enterprise and a means to a competitive advantage.
- the business model 3300 includes business management 3302 , service management 3304 , systems/network management 3306 , and element management 3308 .
- the components of business model 3300 will allow a business to interface with customers 3310 and suppliers/providers 3312 in an effective manner.
- the IT management processes, and workflow scenarios can be identified that are required for ensuring that system performance is achieved and information services delivery are met based on Service Level Agreements. Subsequently, each of the systems management scenarios identified will have its associated IT systems management process architectures and workflow scenario models 3400 as shown in FIG. 34. The models will show the integrating activities and their associated operating inputs and outputs required for insuring that the enterprise operating environment is available and functional.
- the major systems management workflow scenarios are distilled into the following major categories: Set IT Service Expectation, Monitor IT, Respond to IT Situations, and Analyze IT Services.
- the integrated application/information/systems management process architectures and the supporting workflow scenario models will identify the logical IT organizational functions and systems that need to operate and integrate together, portray the enabling operational elements, processes and technology components for achieving the desired delivery of services results based on the corporation's business. goals, objectives, critical success factors, and performance metrics that have been documented in Service Level Agreements, and highlight the system management requirements for ensuring that system performance is achieved, the highest reliability level of the enterprise information system is attained, and information services delivery are met based on Service Level Agreements.
- the integrated application/information/systems management process architectures models will then become the mechanism for ensuring a mutual understanding of what needs to be done among the IT business managers, process owners, and IT system administrators and operators. These models will identify the necessary common technological components required for managing the enterprise information system across the entire enterprise operating environment through employment of IT workflow management practices and technological components.
- An enterprise systems management technology architecture 3500 shown in FIGS. 35 and 35A- 35 C can be constructed to depict the technology layout based on the ITU-T Systems Management Business model 3300 and mapped to the logical location maps of the enterprise.
- the geo-structural view highlights where the enabling application architectural components of the Enterprise Systems Management Software Portfolio are logically located within the enterprise.
- the geo-structural view shows the logical location of all the logical systems management application components that must be integrated together through a technical infrastructure to create the required, integrated, corporate enterprise systems management environment.
- element management 3308 of business model 3300 includes sales/manufacturing locations 3502 , customer service centers 3504 , corporate/regional headquarters 3506 , and operations centers 3508 .
- Each location of element management 3308 may include management information base agents 3510 , enterprise servers 3512 , database servers 3514 , hubs 3516 , ATM switches 3518 , routers 3520 , office servers 3522 , gateways 3524 , mainframe 3526 , and desktop computers 3528 .
- Element management 3308 communicates with systems/network management 3306 over a network 3530 .
- Systems/network management 3306 may include at an operations center 3532 having performance management 3534 , event management 3536 , configuration management 3538 , and systems support 3540 functions. Event management may further include systems monitoring 3542 , network monitoring 3544 , and fault management 3546 . Systems support 3540 may have object management 3548 , print management 3550 directory services management 3552 , time management 3554 software/media management 3556 , security services 3558 and web server management 3560 .
- Business management component 3302 is divided into customer relations management 3562 and supplier/services relations management 3564 .
- Customer relations management 3562 may include departments such as service definition 3566 , financial accounting 3568 , forecasting/reporting 3570 , auditing 3572 , risk assessment 3574 , and business continuity planning 3576 .
- Supplier/services relations management may include service planning 3578 , technology planning 3580 , and resource planning 3582 .
- Service management 3304 is divided into customer assistance/care 3584 and service support 3586 . Customer assistance/care includes help desks 3588 and desktop management 3590 .
- Service support 3586 includes storage management 3592 , change management 3594 , problem management 3596 , security administration 3598 and workload management 3599 .
- an integration table 3600 as shown in FIG. 36 is formulated that identifies the array of systems management applications that must be integrated together as well as with other applications. This matrix will also be found in the information architecture and application architectures because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident.
- the final geo-structural view 3700 as shown in FIG. 37 is of the Enterprise IT Management Organizational framework to illustrate the logical and physical locations of the various organizational components that manage the IT systems and resources.
- a service management center 3702 communicates with internal corporate data stores 2022 and external operational data stores 2024 over network administrative busses 3704 .
- Service management center 3702 processes network administration data 3706 to and from corporate headquarters 3708 , customer service centers 3710 , large sales offices 3712 , small sales offices 3714 , and mobile users 3716 either directly or through regional offices 3718 .
- Each location may include a local area network and telephony administrator 3720 and a desktop administrator 3722 .
- FIGS. 38 A- 38 B depict the IT organizational model 3800 from which the IT organization areas can be identified and modeled.
- An executive board 3802 includes business unit partners 3804 and IT governance 3806 .
- Executive board 3802 provides strategic business direction and value needs and IT governance, policy, and approvals in response to IT leadership and innovation, strategic direction, solutions plan, investment and opportunities and business value results inputs from the enterprise.
- the enterprise performs a manage/deliver IT value function 3808 that uses an IT supply chain model 3810 with plan/manage information technology 3812 , assess demand 3814 , develop products, services, and processes 3816 , and fulfill demand 3818 links.
- Manage/deliver IT value function 3808 generates IT products and IS services for stakeholders and business clients 3820 in response to collaboration, service needs and metrics, and business process innovations developed with them.
- Manage/deliver IT value function is driven by Tower model 500 in conjunction with the people and culture 3822 of the enterprise and its IT partners 3824 .
- IT partners 3824 provide products, experience, trends, services, staff, innovation, and expertise to assist the people and culture 3822 of the enterprise to implement IT development and delivery. Aspects of the people and culture 3822 of the enterprise that are important both individually and to the enterprise include identification of core competencies 3826 , roles and responsibilities 3828 , traits and behaviors 3830 skills and knowledge 3832 , learning reflex 3834 , incentives 3836 , and performance practices 3838 .
- Tower model 500 provides a business context 3840 , IT change initiatives 3842 , IT strategic direction 3844 , IT innovation solution sets 3846 , and IT industry knowledge 3848 in order to deliver the enterprise's IT value.
- the main purpose of the Enterprise Strategic IT Planning Framework Tower model is to identify all of the components and elements necessary to define an enterprise IT architecture and develop an IT plan that is strategically aligned with an organization's business direction.
- the Tower contains reference models representing each component element. Approaches and work patterns employing the appropriate processes, and methodologies will then work towards building, modifying, enhancing, and appropriately consolidating the suggested content of the models into a desired result.
- the result or deliverable is wholly contingent upon what requirements are to be met by the plan. What models are contained in the deliverable are dependent upon the state of the existing and future environments addressed by the planning initiative. For example, if the application architecture has already been defined by a previous business architecture and transformation initiative then this part of the plan will not have to be recreated and “delivered”. If the same initiative provided the appropriate business models and requisite information required by the Tower then those models will suffice and will not have to be rebuilt.
- the model in FIG. 40 details the framework components needed in a comprehensive strategic IT plan to obtain an IT transition plan 4000 .
- the appropriate Tower components are identified and relationships determined that will allow for the development of a strategic IT plan.
- the condition or even existence of the client's architectural components can vary from client to client, organization to organization. Each situation will have to be addressed on a case by case basis and the appropriate approach and work pattern developed to accomplish the desired results.
- the blueprint can also be used as an assessment benchmark, by using the technology policy and standards 4002 , Tower definitions, and reference models as the baseline. This baseline is then compared with the actual architecture components a particular enterprise currently has in place to determine if they need to be created or already exist or need revision.
- FIG. 41 is a graphical depiction of how a blueprint may ultimately guide the formulation of the target model.
- the information that should be in a model exists in multiple formats or sources that are not easily accessible or interpretable. Most often, architecture information is in the minds of the IT organizations and is seldom documented.
- the blueprint identifies what components will be in the target model so that it can be populated by the IT Strategic planning effort. It is critical that the blueprint is established at the front end to define the scope of the initiative. No matter which approach, process, methodology, or technique is used in the construction of deliverables from the blueprint depicted in FIG. 40, the indicated blueprint components (the “what”) are all mandatory considerations in the development of a comprehensive strategic IT plan. The “how” and the practice of getting the desired result is addressed in the development of the approach and work pattern.
- a simplified example of the thought process behind developing a blueprint of the components required for a strategic IT plan and an approach is as follows.
- the business goals, objectives, operating principles, business strategies, external influences, and critical success factors (found in the strategic business plan) for a chosen industry or client dictate the functions that must be performed, and from these are derived the business requirements to meet those needs.
- Processes Value streams are created or evolve from these requirements to accomplish what the business or organization plans to do.
- the business requirements and all of the business issues found in the strategic business plan, the current business environment, and the business architecture in turn drive the technology choices, implementation staging, and integration requirements to enable the appropriate processes.
- An enterprise's overall business strategies are the drivers of the IT organization.
- the IT organization then develops its own strategies, which determine the IT organization's product, service, and fulfillment approach.
- Technical specifications to accommodate the technology requirements, products, services, and processes are directed and governed through the technology policy which articulates IT principles, policies, and standards that guide the evolvement and deployment of the technology portfolio.
- the technical requirements satisfying the business requirements provide the guidelines for the development of the enterprise information, application, and infrastructure architectures. Based on the architectures and all of the other operating environment characteristics the enterprise IT management framework will deal with the business and organizational management of providing IT services, the management of the services, IT systems and network management, as well as asset and element management.
- FIGS. 42 A- 42 B graphically depict how a strategic IT planning approach is constructed from the strategic IT plan blueprint in conjunction with the previous description of the intent behind the IT planning strategy.
- FIG. 43 is a model that illustrates how the passing of selected components of the framework, based on blueprints and an approach created for a specific purpose, through work patterns results in architectures and plans (deliverables) consistent with the blueprint and approach.
- deliverable(s) that is to say the implementation of the recommendations and initiatives typically found in the transition plan
- the client can realize the intended target enterprise environment.
- the existing components as illustrated in FIG. 41 and those tailored for certain industries, or clients will also vary the outcome.
- the Tower components passed through work patterns will deliver different results for the telecommunications industry as opposed to the health care industry.
- the development of the detailed work pattern can begin once the appropriate IT planning blueprint has been decided upon, the blueprint components selected from the Tower model are evaluated depending on customer needs, pre-existing conditions, IT and business environments; and maturity of existing client architectures and frameworks, and the planning strategy and approach is determined.
- the detailed work pattern will correlate the contents of the components, elements, and associated reference models into a unified whole for a specific purpose and result or set of deliverables. Basically the process of defining the activities and inputs and outputs of the “population” of the Tower reference models is begun.
- Modeling is a graphical technique for articulating the events that need to occur based on an understanding of the inputs and outputs and the relationships between those inputs, outputs and activities to deliver desired results.
- the preferred modeling methodology is to follow the business process reengineering concepts of decomposing the business architecture into value streams, value stream architectures, and workflow models and using Visual Design Language (VDL) as the architecture and work flow notation.
- VDL Visual Design Language
- the value stream decomposition is focused on inputs and outputs and is very structured, and VDL, using a very rich syntax, very capably articulates the results of the modeling effort.
- VDL value streams and architectures and VDL are used in the examples.
- Input/Output represents patterns and nouns or objects that either are used as information or a component that is used to produce other components through the execution of an operation or process.
- An example is raw materials or information.
- the result of the acted on input by the process is the output.
- Process a set of activities that use clearly identified input(s) to produce clearly identified output(s).
- a process flow is the full description of the elements that define the process activities.
- a process maybe completely described on a single diagram or complex enough that several layered diagrams will be required to represent it.
- Operation or execution scenario is a logically related set of a process's activities that uses clearly identified input(s) to produce clearly identified output(s).
- Pattern a shared set of relationships between an aggregation of elements. Elements can be anything in any combination—people, pieces of paper, food, character traits, behaviors, other patterns, relationships, or anything else we can identify.
- Noun or object a noun is more than just a person, place, or thing. It may also be a concept, class, or category.
- Attribute refers some feature or quality about an element. Concrete attributes are things like color, size, state, status and other “objective” statements. Induced attributes are in the eye of the beholder. Things like quality and a good place to work fall into that category.
- Verb a kind of relationship between nouns or noun-like elements that involves action. VDL has a rich set of verbs and graphical ways to represent them. The symbol shown here is the Create verb.
- Integral to the process of delivering a strategic IT plan is the use of a methodology that ensures the work pattern is accurate and complete and adequately describes the approach that has been decided upon.
- the preferred method for depicting the work pattern workflow is VDL.
- the inherent discipline and structure that this method requires assures completeness of the process and supports reasonable and common graphical representations of the information that allow for communications of the results.
- This particular example of the workflow scenario assumes that the blueprint requires all of the strategic IT planning blueprint components to be developed during this project.
- FIGS. 44 A- 44 B depict the workflow scenario for delivering a strategic IT framework.
- the first critical step defined in the workflow is to initiate the engagement or project by defining the approach, identifying participants including project team members, decision makers, and information sources, establishing the duration and key milestones, and establishing the scope and objectives. Interviews with key participants are then conducted with typically parallel efforts to gather existing documentation. This set of work or activities will lead to the next major steps, which are the development of the requisite business and technology models inclusive of current situation analysis and future direction understanding.
- the Tower reference models are fully documented and in this case are considered to be major deliverables with appropriate client participation and approvals for content.
- the Enterprise Strategic IT Planning Framework Tower is the starting point for determining the context and mandatory, major components and methods needed to develop a strategic IT plan and consequently build IT solutions for a successfully enabling an enterprise.
- the Tower will help IT personnel to effectively analyze and evaluate business and technology requirements, put them in their proper context, and ensure that due consideration has been given to all of the architectural components needed to support business needs and requirements.
- the Tower will help achieve the goals of defining and embodying a value proposition and intellectual capital based on experience and success, ensuring consistency of delivery and integration of results, ensure specificity in definition but not in a prescriptive “cookbook” approach, and allowing tailoring to individual and unique client requirements but building from a foundation of “best practices”.
- the strategic IT plan's implementation will provide the framework and process for defining the vision, mission and long term objectives for IT and aligning them with the business, the strategies for achieving them, and the architectures to enable them.
- the strategic IT plan's implementation provides the context and guidance that drives the definition of integrated business and IT systems (in support of business processes and functions), organization structure, and IT solution sets for products and services.
- the strategic IT plan also determines the actions and parameters for the allocation of resources to meet the objectives and allows for a deliberate, planned, and effective utilization of an enterprise's investment in time and resources.
- Architecture, workflow, and event models are required that are balanced and leveled with inputs and outputs.
- the function/process model is optional. Typical modeling approaches create just the workflows and a few include the event models.
- the architecture models are missing, and usually the workflows are not balanced and leveled with the inputs and outputs.
- the architectures are required in order to bring the models to closure and some reasonable state of finality.
- the architectures enable the workflows initiated by the external events. It clearly defines relationships between all components of the enterprise through the inputs and outputs.
- Decomposition of the architecture and workflow models is required. Proper decomposition around outputs or results reduces the complexity of the enterprise into manageable and integrated elements. It also enables the possibility of outsourcing with well-defined requirements and business rules for each element.
- the enterprise decomposition evolves around an output or result, not an activity or function. Sawing it in pieces never decomposes an airplane. You do not want to fly a reassembled airplane that was sawed in pieces. The same holds true for a Value Stream.
- Enterprise Models defined as an ordered set of activities linked by predefined relationships, execution of which is triggered by some events(s) and which result in some observable or quantifiable end result. This integrated set of abstract models illustrate the following characteristics about the enterprise: what, how, when, who, how much and where. Enterprise models are the knowledge base and memory of the enterprise.
- Value Streams An end to end array of activities that collectively integrates cross-functional processes across an enterprise and creates value (i.e. speed, quality, service and/or cost benefit) for both internal and external customers.
- the Value Streams reconcile all the views a customer may have of the enterprise and create the view of a single, serving enterprise dedicated to the customer.
- the Value Streams satisfy the customer wishes as fully as possible, rather than to focus on internal procedures (or functions) such as accounting or selling or shipping.
- Models Models of Architecture: These illustrate the style and method of design and construction that comprises the elements of a system and defines the purpose and interrelationships of those elements.
- Event Models These illustrate the things that happen outside the enterprise/Value Stream to which the enterprise/Value Stream must react in a preplanned way.
- Function/Process Models Defined as a set of models illustrating the functional groupings of an enterprise. These are further subdivided into two groups, primary (e.g. Operations) and supporting (e.g. Finance). Each functional group contains several unique business processes (e.g. for Finance, Accounting and Asset Management).
- VDL VDL modeling diagrams.
- VDL was authored by Neal Goldstein, who is a consultant on business process design, software development methodologies, and object technology. His emphasis is on innovating business processes, and the appropriate use of technology in implementing the processes. He has been Director of Management Information Systems for a Fortune 500 corporation and the primary architect of a number of systems that have implemented redesigned business processes. He can be reached at
- FIGS. 46 A- 46 K show the symbols used for noun and noun-like notations used in VDL modeling diagrams.
- FIGS. 47 A- 47 J show the symbols used for verb notations used in VDL modeling diagrams.
- FIGS. 48 A- 48 G show the symbols used for modifier notations used in VDL modeling diagrams.
- FIGS. 49 A- 49 H show the symbols used for preposition notations used in VDL modeling diagrams.
- FIGS. 50 A- 50 F show the symbols used for conjunction notations used in VDL modeling diagrams.
- a noun corresponds to the noun in English. Nouns may act (be a subject) or be acted upon (object). And just as in English, a noun is more than just a person, place, or thing. It may also be a concept, class, or category. What makes an element a noun is what makes a word a noun in English, how it is used. In our case, a noun is something that can appear on one or the other side of a noun verb noun phrase.
- Nouns are also referred to as objects.
- a solid disk represents a noun.
- Noun-like elements are not strictly nouns, but can act like them, i.e. they can act as a subject or object.
- the Frame is the scope of the explanation. It can be an extended enterprise, enterprise department, system, etc.
- a Frame is represented by a rectangle with two right angle lines in the top left corner.
- a pattern is a shared set of relationships between an aggregation of elements. Elements can be anything in any combination—people, pieces of paper, food, character traits, behaviors, other patterns, relationships, or anything else we can identify. Patterns can be used to represent an abstraction, class, category, or any cognitive set of properties such as a “vehicle” or the similarities between version of a process. A pattern is a shortcut that avoids the need to separately describe each element. A “bowl” shape represents a pattern.
- a process is set of activities that use clearly identified input(s) to produce clearly identified output(s).
- a process takes time and almost always crosses functional boundaries in most (functional) organizations.
- a process may be value added, support, or non-value added.
- An hourglass represents a process.
- a Sub process summarizes all activities in a functional area, such as accounting or operations. Placing an “S” in the process symbol identifies a sub process.
- An operation or execution scenario is a logically related set of a process's activities that uses clearly identified input(s) to produce clearly identified output(s). It can be decomposed to describe the components, behaviors, and their first order relationships that result in an operation's output.
- An operation should be a gestalt, a whole that is taken by the viewer as being more than just the sum of its parts.
- a file folder represents an operation. At times it is useful to organize activities hierarchically so that a single operation as a whole is represented as a single element in a larger operation. In this case the operation element can represent a sub operation.
- a procedure scenario is an activity that is measured by result and behavior. Associated with a procedure scenario is a high level set of instructions to perform the activity.
- a scenario performed by a computer may have several content rules for performing computer operations associated with it.
- a scenario performed by a person using a computer may have several specifications for the interface or several interface rules associated with it.
- the content rules contain additional elements. These include content objects and abstractions. These are directly analogous to, respectively, nouns and patterns. We use hard angles with content elements to identify them as technological creations used by a computer rather than the real world or concepts.
- a content object is a technological creation, usually inside of a computer.
- a parallelogram-type solid represents a content object.
- a content abstraction is an assertion that certain content objects share the attributes and responsibilities listed for the abstraction.
- a content abstraction is a shortcut that avoids the need to separately describe each content object.
- a shallow box represents a content abstraction.
- a verb is a kind of relationship between nouns or noun-like elements that involves action. Some verbs require that the noun on one or both ends of the relationship be active, i.e. able to behave.
- the requirement for a active noun, or one that is capable of behaving is represented in the Language Reference by an “A” inside of a circle. Things like people, computers, and machines are active, while things like information, rocks, and business reports are not.
- verb symbols can either be drawn from a noun or from a specific activity.
- An active noun can create nouns and other elements. Create is represented by a line with a plus sign (+) on the end toward the element being create.
- An active noun can destroy nouns and other elements. Destroy is represented by a line with a minus sign () on the end toward the element being destroyed.
- An active noun can manipulate nouns and other elements. Manipulation encompasses change, modification and physical movement. Manipulate is represented by a line with an arc on the end toward the element being manipulated noun.
- An active noun can use (usually non-active) nouns as information. As we said, what makes something information is that it answers a question. Use as information is represented by a line with a reverse arrow on the end toward the object that contains the information.
- Active nouns can use (usually non-active) nouns as input. This is most commonly used to represent things like raw materials used in an activity or process. Use as input is represented by an arrow with the arrow head on the end toward the object that uses the input. You may also distinguish between information, which answers questions, and data, which serves as input, by treating data as input.
- An active noun can use (usually non-active) nouns as a rule or constraints placed upon a process or action.
- Use as a rule is represented by a line with a double reverse arrow on the end toward the object that contains the rule.
- Two active nouns can be collaborating. Collaborating is a two-way interaction. A double-headed arrow passing through a conduit represents collaborating. Since to be able to send information (or commands) from one noun another, there must be an activity for the sender that sends the message and one for the receiver that receives and acts on the message, collaboration is more commonly shown between activities.
- An active noun can command active nouns.
- Command is a one way interaction. Command is represented by an arrow passing through a conduit, with the arrowhead on the end toward the object that receives (and performs) the command.
- An element can cause something to happen. Cause is different from create in that it is indirect. I don't make a customer unhappy—an action on my part causes a customer to become unhappy. This relationship can exist between any two elements. A dashed line going through a conduit with an arrow on the end toward the element being caused represents cause.
- An element can cause something to change. Cause to change is different from manipulate in that it is indirect. Cause to change is represented by a dashed line with an arc on the end toward the changed element.
- An attribute describes some feature or quality about an element.
- An attribute is represented by a flat oblong disk, slightly above the plane and connected to the element. Attributes can be concrete or induced. Concrete attributes are things like color, size, state, status and other “objective” statements. Induced attributes are in the eye of the beholder. Things like quality and a good place to work fall into that category. Induced attributes are based upon some mental model of what that attribute means. A dash of quality cannot be added to a product during quality assurance, it becomes an attribute when a certain set of conditions are true.
- Active nouns may have explicit activities specified.
- An activity is a specific action, with a result that can be measured and/or evaluated. Activities can be either responsibilities or procedures.
- a responsibility is an activity that is measured by results rather than behavior.
- a responsibility is represented by text over a line, slightly above the plane and connected to the element.
- a procedure is an activity that is measured by result and behavior. Associated with a procedure is a step-by-step set of instructions to perform the activity. A procedure is represented by text over a line, over a document icon, slightly above the plane and connected to the element.
- a sub operation can be represented by an operation within an operation.
- a sub operation is represented by text over a line, over an operation icon, slightly above the plane and connected to the element.
- An activity performed by a computer may have a business or content rule for performing a computer operation associated with it.
- a content rule is represented by text over a line, over a computer icon, slightly above the plane and connected to the element.
- An activity performed by a person using a computer may have specifications for the interface or an interface rule associated with it. To indicate this, a monitor icon is placed under the activity's text line.
- Two elements can be aligned. Elements are aligned when both have the same goals. Aligned is represented by a dashed line passing through a conduit.
- Two elements can be consistent. Elements are consistent when they are compatible or synchronized at the operation level. A line passing through a conduit represents Consistent.
- An element may be implement by, or partially implemented by another element. Implemented by is used to indicate satisfaction of some requirement and is usually a relationship between things of different types. Implemented by is represented by a line with a double headed arrow from the element being implemented to its implementation, with the arrow heads on the end towards the element that is the implementation. Partially implemented by is represented by a dotted line with a double headed dotted arrow from the element being implemented to its partial implementation, with the arrow heads on the end towards the element that is the partial implementation.
- One element may be replaced by or partially replaced replaced by another. This may occur when something becomes obsolete. Replaced by is represented by a line with an “x” on the end toward the element being replaced. Partially replaced by is represented by a dotted line with an “x” on the end toward the element being replaced.
- a noun can be part of another noun that is a grouping of objects that combine to make up a whole. Part of is represented by an arrow with right-angle lines coming from the top of the part into the bottom of the whole, with the arrow-head on the end toward the whole.
- a noun can be contained in another noun. Contained in is represented by a curved arrow from the element contained, into the top of the element containing it, with the arrowhead on the end toward the container.
- An element can be a kind of or type of another element. This is the case when they share properties. This relationship can exist between any two elements, and not just an element and a pattern, which we indicated can be used to define what the shared properties are. In the former case, all you may want to show is that one element is a type of another element, without describing their shared properties.
- a curved arrow with right-angle lines represents type of, coming from the element that is the type of, with the arrow head on the end toward the element that is that type.
- a conjunction is used to join elements.
- a time line can show that time has passed.
- An object's activities can also be placed along a time line at the point in time at which they execute.
- a time line is represented by a alternating short and long dashes.
- a time line is necessary to show time in a Context.
- a delay in a time line may be represented by two 45 degree lines indicating the start and end of the delay.
- An attribute may be used to explain the delay or conditions for restart.
- a set of activities may repeat. Two vertical lines indicating the start and end of the segment that repeats represent Repeat. An attribute may be attached to the right vertical line to indicate the conditions that causes the repetition to stop. Repeats may be nested.
- One or more of the elements may exist. One or more is represented by a line with a number of branches corresponding to the number of alternatives. None may be a choice and must be explicitly indicated. This can be used to indicate such things as the possibility of one or more paths in a time sequence or one or more relationships, one or more attributes, one or more things contained, one or more parts, and the like.
Abstract
Description
- The present invention relates in general to business and information technology modeling techniques and in particular to a structure for and a method of modeling integrated business and information technology frameworks and architecture in support of a business.
- In order for a business enterprise to align and enable business resources, there must be an assessment, identification, construction, modification, enhancement, and integration of business and information technology components. However, most enterprises lack a basis from which strategic information technology planning approaches can be derived and developed to deploy requisite business and information technology components. Thus, a business is not able to ensure a successful information technology enablement of cross functional business processes into end-to-end activities. There is no mechanism or framework in the information technology (IT) industry for a foundation that provides essential integrated business and information technology reference models necessary for defining, constructing, or assessing an enterprise architecture. There is no common integrated, adaptive, or complete benchmark from which business and information technology processes and requirements can be assessed and developed. Therefore, it is desirable to provide a business with a foundation framework or structure that allows the business architecture to drive the technology architecture and also allow the technology architecture to have a direct impact on the construction of the business architecture through enablement or providing new and creative ways of conducting business.
- From the foregoing, it may be appreciated that a need has arisen for an effective technique to model a business. In accordance with the present invention, a method and structure for modeling frameworks and architecture in support of a business is provided that substantially eliminates or reduces disadvantages and problems associated with conventional business and IT modeling techniques.
- According to an embodiment of the present invention, there is provided a method of modeling frameworks and architecture in support of a business that includes identifying manageable entities of the business. An overall architecture for the business is determined that defines how the manageable entities relate to each other. The overall enterprise architecture is represented in a tower model with six fundamental components—strategic plan, business architecture, information architecture, application architecture, technology infrastructure architecture, and enterprise information technology management framework. Each fundamental component or plane in the tower model may include sub-planes to further define the architecture of the business enterprise. A common language is implemented in order to articulate the overall architecture. Technology requirements for the business are analyzed, planned for, and implemented according to the overall architecture.
- The present invention provides various technical advantages over conventional business modeling techniques. For example, one technical advantage is to provide discipline for delivering repeatable and effective information technology enabling solutions to accommodate business needs. Another technical advantage is to promote integration of business and technology planning and establishing a technology strategy that both sustains and directs business efforts. Yet another technical advantage is to provide a common model for articulating the mandatory components of an enterprise architecture and the baseline for developing information technology planning and integration approaches. Still another technical advantage is to effectively manage a heterogeneous technology environment. Other technical advantages may be readily ascertainable by those skilled in the art from the following figures, description, and claims.
- For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings, wherein like reference numerals represent like parts, in which:
- FIG. 1 illustrates a planning continuum showing the intermediate steps from a business strategy to deliver information technology;
- FIG. 2 illustrates the planning continuum in more detail showing inputs, outputs and relationships;
- FIG. 3 illustrates a simplified block diagram of an enterprise architecture for a business, and how business and IT interrelate;
- FIG. 4 illustrates fundamental strategic information technology planning framework components;
- FIG. 5 illustrates an enterprise strategic information technology planning framework tower model;
- FIG. 6 illustrates an operating environment model for the enterprise business;
- FIG. 7 illustrates support and line functions for the enterprise business;
- FIG. 8 illustrates a logical business location map;
- FIG. 9 illustrates a geo-structural view of the logical business location map;
- FIG. 10 illustrates an information technology investment and expenditure profile;
- FIG. 11 illustrates a client information technology and industry expenditure benchmark;
- FIGS.12A-12C illustrate the enterprise business frame with the external inputs and outputs and associated entities
- FIGS.13A-13D illustrate value stream aggregates of the business' enterprise;
- FIGS.14A-14B illustrate a value stream event model and corresponding metrics;
- FIG. 15 illustrates a process architecture for a value stream of the business enterprise;
- FIG. 16 illustrates a value stream environment model;
- FIG. 17 illustrates a process workflow scenario model for a value stream;
- FIG. 18 illustrates enterprise information and data management framework and precepts;
- FIG. 19 illustrates business intelligence scenarios;
- FIG. 20 illustrates a geo-structural component view for information architecture;
- FIG. 21 illustrates an information and data architecture data warehouse framework;
- FIG. 22 illustrates an information application portfolio and system integration matrix;
- FIG. 23 illustrates an example of an integrated application architecture for value stream enablement;
- FIGS.24A-24B illustrate a geo-structural component view for an application architecture;
- FIG. 25 illustrates an enterprise application software portfolio and system integration matrix;
- FIG. 26 illustrates an example of application portfolio best practices recommendations;
- FIG. 27 illustrates a technical reference model, associated platform, and governance structure of policies and standards;
- FIG. 28 illustrates a logical location connectivity model;
- FIG. 29 illustrates a logical location and logical software component matrix;
- FIG. 30 illustrates a logical location software deployment scheme;
- FIGS. 31 and 31A-31D illustrate a geo-structural component view for a technology infrastructure architecture;
- FIG. 32 illustrates an example of technology infrastructure architecture best practices recommendations;
- FIG. 33 illustrates a system management business model;
- FIG. 34 illustrates enterprise systems management process models;
- FIGS. 35 and 35A-35C illustrate a geo-structural component view for an information technology systems management architecture;
- FIG. 36 illustrates an integration matrix for a systems management software portfolio;
- FIG. 37 illustrates a geo-structural component view for an enterprise information technology management organizational framework;
- FIGS.38A-38B illustrate the enterprise information technology management organizational model;
- FIG. 39 illustrates a framework blueprint;
- FIG. 40 illustrates a strategic information technology plan blueprint;
- FIG. 41 illustrates how a blueprint guides formation of target models;
- FIGS.42A-42B illustrate an approach to strategic information technology planning;
- FIG. 43 illustrates the construction and implementation of a strategic information technology plan;
- FIGS.44A-44B illustrate a strategic information technology framework workflow delivery scenario; and
- FIG. 45 illustrates the components of a strategic information technology plan;
- FIGS.46A-46K illustrate the symbols used for noun and noun-like notations used in VDL modeling diagrams;
- FIGS.47A-47J illustrate the symbols used for verb notations used in VDL modeling diagrams;
- FIGS.48A-48G illustrate the symbols used for modifier notations used in VDL modeling diagrams;
- FIGS.49A-49H illustrate the symbols used for preposition notations used in VDL modeling diagrams;
- FIGS.50A-50F illustrate the symbols used for conjunction notations used in VDL modeling diagrams.
- Strategic Planning
- Strategic planning provides the context and guidance that drives the definition of business functions, processes, systems, and organization. It is the process of defining the vision, mission and long term objectives for a business and the strategies for achieving them. The strategic planning process determines the actions and the allocation of the resources to meet those objectives. The resulting strategic plans allow the enterprise to effectively use its time, resources, intellectual capital and experience and transition from a current state to a new way of conducting business. In this document two enterprise planning processes are of major interest because of their direct correlation and interdependencies. First is Strategic Business Planning, which is the process of defining the mission and long-term objectives for the business and the strategies for achieving them. Second is Strategic IT Planning, which is the process of defining frameworks and architectures in support of the business, and creating the plan for implementing those frameworks and architectures. Although the focus is on IT planning, the output of the strategic business planning process, the business plan, is what drives and must always be considered in the creation of a successful IT plan. Through the use of a Strategic IT Planning Framework Tower, an enterprise will have the appropriate strategic information frameworks guiding the appropriate technology direction necessary to effectively implement the organization's business direction.
- FIG. 1 is a high level diagram illustrating a
full planning continuum 1000 from business strategy through IT strategy to IT solutions delivery. IT planning is an integral part of that continuum. In today's dynamic business environment, it is critical to make accurate and timely decisions about what technology to invest in, when change should occur, and what value the business will receive by implementing a new technology paradigm. To insure that these decisions are reasonable, the IT strategic planning process and deliverables need to be driven and guided by the business context within which the enterprise will reside. - FIG. 2 maps to the high level diagram of FIG. 1 and shows the range of business activities from business planning and process improvement through to the delivery and management of IT solutions to support the business processes. The boxes on the left hand side represent intellectual capital in the form of models and template solutions. The boxes on the right hand side represent the products delivered to a client and are the major components of an IT plan. The process thread running down the diagram illustrates how the activities and inputs and outputs relate to each other. The bars on the right of the diagram depict the scope of activities provided by various organizations and approximate the rudimentary composition of the Strategic IT Planning Framework Tower model. The Enterprise Strategic IT Planning Framework Tower model in conjunction with a suite of IT planning services fills the gap between management consulting and the delivery of IT solutions. The following sections cover the concepts behind the Enterprise Strategic IT Planning Framework Tower and the use of the framework components to provide strategic IT planning.
- In FIG. 2,
planning continuum 1000 flows frommanagement consulting 1002 throughIT planning 1004 todelivery 1006. In themanagement consulting 1002 phase, business planning andtransformation 1008 is performed in response tobusiness context industry 1010 and common 1012 business models and business strategies such as abusiness transformation plan 1014, business plan andarchitecture 1016, andother business strategies 1018. Information developed during themanagement consulting 1002 phase is used to drive enterprise IS/IT development 1020 in theIT planning 1004 phase. Enterprise IS/IT strategy development 1020 reacts to inputs from ISarchitecture industry 1022 and common 1024 models in order to drive enterprise IS/IT strategies 1026. From strategy development and strategies themselves, an enterprise IS/IT architecture definition 1028 is determined based on ITarchitecture reference models 1030. Enterprise IS/IT architecture definition 1028 aids in generatingtransition plans 1032 and enterprise IS/IT architectures 1034 in order to drive highlevel solutions development 1036. Highlevel solutions development 1036 is based onsolution models 1038 and results in high level solutions 1040 and transition plans 1042 for their implementation. Once high level solutions 1040 are generated, solutions andservices delivery 1044 is performed based oncomponents 1046 andtemplates 1048. Deliverables includedesigns 1050,code 1052, andapplication systems 1054. Following delivery, amaintenance function 1056 is set up for the deliverables. - Strategic IT Planning
- Strategic IT planning is the process of modeling and defining frameworks and architectures in support of the business and creating the plan(s) for implementing those frameworks and architectures. Strategic IT planning is defining, not designing. A strategic IT plan does not design systems, databases, or networks. The design and implementation work is initiated after the definition process has been completed. Based on this premise, a process for defining the frameworks and requisite architectures and their use is demonstrated. In order to convert the initiatives from an enterprise strategic business plan into manageable and implementable results, three things must occur. First, complexity is decomposed into manageable units. Second, architectures and frameworks are built that can be used to model the business and the enabling IT. Third, a common language is decided upon and used to articulate the frameworks and architectures.
- First, the enterprise is broken down into manageable entities or components. Just like an airplane can be decomposed into its separate parts using a bill of materials which is a list of products and specifications that describe the product elements, characteristics, and sometimes assembly requirements, the same can be done for an enterprise. A decomposed enterprise needs to be defined so it can be understood within the context of the whole and detailed enough to be analyzed for change, sourcing, and assembly, just like the bill of materials for an airplane. Not only does this enable various teams and organizations to develop processes for transforming inputs into outputs, but also better enables IT to support the transformation.
- Second, there is a need for an overall architecture (or framework) to describe how all the parts (or organizational components) fit together and how each part relates to one another. Therefore the architecture of the enterprise is the true enabler of any activity, process or function. If an essential architectural component is not found in the enterprise (or addressed in an outsourcing agreement), associated activities, processes and functions cannot be completed.
- Finally, there must be a common language or way to communicate in clear and precise terms that all parties involved will understand. Not one language for the sales people, and another for the back office people, and another for the IT people, but one that all understand and from which all other models and architectures are derived. This common language is not the lowest common denominator, but rather a significant step up in learning how to communicate in objective graphical models.
- Having fulfilled these needs and using the models developed of the enterprise, understanding and implementation of the initiatives can begin. In addition to providing boundaries, enterprise models represent the common repository of data, information, and knowledge about the enterprise. The graphical representations precisely describe the enterprise in clear and understandable terms. The scope of the models is four dimensional considering functional activities within a department, cross-functional activities within the company, customer and supplier activities, and finally, competitor activities such as “time to market.” This holistic view and understanding enables IT alignment with the enterprise and its objectives and goals.
- From these models that the current state of the enterprise is analyzed from which IT architectures and frameworks and a transition plan to the future state can be developed. The models also allow decomposition of the enterprise into manageable and understandable units, thereby reducing complexity. It is from this decomposition that effectiveness, efficiency, and adaptability are designed and optimized by the enterprise. However it must be understood that no single model or decomposed unit provides the “silver bullet” solution for the enterprise. The synthesis of information from the integrated business and IT models provide the “links” which unite the enterprise into a holistic entity, thereby aligning a complete enterprise strategy with people, processes and technology.
- In giving definition and structure to the enterprise it is a basic tenet that no complex “system” can be optimum to all parties concerned and have all functions optimized. Consequently, architecting, or the development of an architecture or framework to control and delimit complexity, is a matter of fit, balance, and compromise of many factors and many interests. This is especially true in the development of a structure, or architecture, within which to build complex IT systems that will support and enable the business of the enterprise. A system can be considered to be a set of different elements connected or related in such a fashion as to perform a unique function not performed by the elements alone. The most important and distinguishing characteristic of a system, therefore, is the relationship among the elements. The definition of a system can be further refined and broken into basically two parts: as a complex set of dissimilar elements or parts so connected or related as to form an organic whole, and the whole is greater than the sum of the parts; that is to say, the system has properties beyond those of the individual parts. The purpose of building systems is to acquire those properties provided by the whole. As previously mentioned, the essence of systems is relationships, interfaces, form, fit, and function. Therefore the essence of architecting is structuring, simplification, compromise, and balance. The challenge is in the control, if not the reduction of complexity and uncertainty, and this must be reflected in the architecture.
- The development of an architecture must be pragmatic as well. There must be an expansion or reduction of the problem at hand to a realistic, workable, and implementable, size and structure. The framework must dictate structures that are achievable. Experience provides the answer to why there is a need for architectures and frameworks. Enterprises with inadequate, poorly defined, and undocumented architectures are prone to high IT resource expenditures and have difficulty fitting system components together. That is to say, the pieces of a system do not fit and satisfy the intended function. The architecture makes the pieces fit, and facilitates the integration and resolution of structural conflicts. The architecture defines the whole. Serious difficulties arise when the number and nature of elements result in so many complex interfaces that what one subsystem does to the rest is no longer as simple as single inputs and outputs. In this case the relationships between function and form breakdown. The architecture, the creation of a framework or structure, brings order out of chaos, establishes system relationships, and acquires the desired properties of the whole.
- As with modeling the business enterprise, an IT architecture can perhaps be best understood as a top-down description of the structure of the system. Therefore models can help in describing the structure. In this case a model is an abstraction of what the participants think and hope the end system and its environment will look like. By implying a great deal of internal structure, a model can communicate a wealth of information in a simple aggregated form. For example a model of a house is quickly understood by all parties, not only in its external shape, but also in its likely electrical, plumbing, and heating systems, its living space, and its relationship to its surroundings. The best architecture is based on the complete submission of the individual parts to the purpose or function of the whole. “Form follows function” becomes a guiding principle. Successful systems can be developed following an architecture that is driven by function instead of form. However it should be noted that successful architectures evolve slowly, and are not created with such detail that they stifle innovation. If an architecture is over defined, the builders will have no choice or flexibility other than to “build to print”. That is to say, with too much specificity the system developer or implementer will not have the option to improve or adjust the design to meet changing business environmental demands or technological change.
- To simply take what currently exists and try to make it work together in most cases is not realistic, pragmatic, nor will it meet the business needs of an organization. No builder or system developer can remedy a fundamentally flawed concept. However given a sound architectural foundation, success can be realized and will only be contingent on the skill of the builder and the engineers. Finally, enterprise models and IT architectures and frameworks without a plan accomplish little or nothing, never reaching implementation. Therefore strategic IT planning is tantamount to success if anything is to be accomplished in an orderly, efficient, and effective manner in support of the business needs of the enterprise. The following points summarize the intent and value of enterprise strategic IT planning:
- An Enterprise Strategic IT Plan and its implementation will provide the framework and process for defining the vision, mission, and long term objectives for IT and aligning them with the business; define the strategies for achieving them, and define the architecture to enable them. The IT Plan also provides the context and guidance that drives the definition of integrated business and IT systems (in support of business processes and functions), organization structure, and IT solution sets for products and services. The IT Plan determines the actions and parameters for the allocation of resources to meet the objectives. The IT Plan allows for a deliberate, prioritized, planned, and effective utilization of an enterprise's investment in time and resources.
- Enterprise Framework
- As previously mentioned, strategic IT planning is the process of modeling and defining frameworks and architectures in support of the business and creating the plan for implementing those frameworks and architectures. It must be reemphasized that strategic IT planning is defining, not designing. Therefore, in order to define all of the necessary IT frameworks and architectures in a consistent and repeatable fashion and to insure that all of the mandatory and appropriate components of a comprehensive enterprise IT plan are present, a planning framework and model must be defined and used.
- The Enterprise Strategic IT Planning Framework Tower is the primary vehicle through which architectural information is communicated. The use of the Tower model, the concepts behind the makeup of the model, and the concept of the blueprints and work patterns that together can be used to produce strategic IT plans and technology architectures that support the business needs of a corporation will be demonstrated. The Tower is the starting point for determining the context and the foundation components and elements needed to build a strategic IT plan, enterprise architecture, architecture components, and enabling IT solutions and strategies for an enterprise. The components and elements identified in the Tower help planning practitioners to effectively analyze and evaluate technology requirements, put them in the proper business context, and ensure that due consideration is given to all of the business and technology components necessary to address and support business drivers and modernization requirements.
- The Tower also provides the baseline against which a business can measure their current environment and initiatives to ensure they are working with and within a comprehensive framework for the design, engineering, acquisition, and deployment of technology-enabled solutions to meet specific business goals. The specifications, or “building codes”, for some of the technical component architecture are found in a Technology Policy which covers the governance of standards and design guidelines. Tower blueprints dictate the assemblage of framework model components for the construction of desired deliverables such as a strategic IT plan. The framework components indicated in the blueprint are then incorporated into an approach and consequently processed through work patterns using various methodologies and techniques to produce a customized strategic IT plan, enterprise architectures, or other deliverables. It is in the work patterns that the prescription and execution of approaches, methodologies, processes, techniques, and tools for developing the specific deliverables are determined and take place. A suite of approaches and work patterns deliver strategic IT plans and other associated deliverables.
- In order to develop a comprehensive enterprise strategic IT plan and the
requisite enterprise architecture 30 for an organization, two types of architectures must be considered together: thebusiness architecture 32 and theinformation technology architecture 34, as shown in FIG. 3. The combinations of these two elements make up the enterprise architecture to include anenterprise management framework 36, as shown in FIG. 3 that allows for the management of the two architectures. The business architecture is the main driver for the IT architecture but the IT architecture can also have an impact on the construction of the business architecture through enablement or providing new and creative ways of conducting business, for example, the internet. - In order to build client-specific or unique enterprise architectures and ensure that all of the mandatory tenets, processes, components, and elements are present and placed in the proper context, there must be a framework to work within. The framework is built around the essential, mandatory components of an enterprise architecture and addresses people, processes, and technology. The decomposition of the enterprise architecture can be represented by a model made up of six
fundamental components 40, depicted as planes shown in FIG. 4 These components make up an enterprise architecture, and include both the business and IT architectures. Each plane represents a mandatory component inenterprise architecture 30 and must be addressed in a strategic IT plan. The intent of the planes is not to imply a sequential flow but to help easily identify and categorize requisite architectural components and their elements. However it should be understood that there are requisite relationships between components and elements though not depicted by this particular model. - For enterprise strategic IT planning and enterprise business and IT architecture development, each component of the framework contains the requisite elements (sub-components). Addressing these elements not only makes each component complete, but also allows a “hard link” to be established to other components in the framework. The components contain everything deemed necessary for completeness—both on the business side as well as the IT side. The following is a high level overview of the content of the fundamental components:
- Strategic Plan(s)41—Every enterprise should have at least six types of strategic plans: Business Plan, Product Plan, Financial Plan, Organization Plan, Marketing Plan, and IT Plan. The plans provide the context and guidance that drive the definition of business functions, processes, systems, and organization. Strategic business planning is the process of defining the mission and long-term objectives for the business and the strategies for achieving them. The IT plan defines and guides the technology enablement of the business and related plans. In both of these plans are the executable roadmaps for implementation and deployment of the plans.
-
Business Architecture 42—reflects a view of what the business must do today as well as in the future to accomplish particular business requirements. The business architecture defines the business organization structure, IT investment and expenditure profile, functions, business process architectures (value streams), workflow scenarios, and the enterprise operating environment within which they all exist. -
Information Architecture 44—represents what information must be delivered to individuals across the enterprise to help them effectively execute the business processes and make informed decisions. This plane contains the information and data management framework and precepts, the business intelligence component processes, the geo-structural view of information specific technology deployment, and the information-application software portfolio. -
Application Architecture 46—serves to support business process execution (value stream enablement) and bring information and data to the process. The application architecture defines the application software portfolio and integration relationships. Application inputs and outputs are identified as well as the application geo-structural view for deployment. Guiding principles, standards, and design characteristics support the acquisition as well as development and integration of applications. -
Technology Infrastructure Architecture 48—defines the IT components necessary to enable access to information and provide support for the execution of activities. This plane contains the standards and policies or “building codes” for technology infrastructure construction. This plane also contains a characterization of the target environment, and identification and views of the future geo-structural layouts with IT platform requirements and characteristics that will provide the basis for engineering blueprints. - Enterprise
IT Management architecture 49—deals with the business and organizational management of providing IT services and products, the management of the services, IT systems and network management, to include security, as well as element management. This layer also encompasses the enterprise IT management organization capabilities, competencies, skills and performance models necessary to implement the desired culture and behaviors. - FIG. 5 shows the
Tower model 500 and graphically depicts the decomposition of the mandatory components (depicted in gray) into sub-planes. A sub-plane is a convention to clarify and detail the element content of a mandatory component. For example, a business architecture is typically composed of those elements associated with: an enterprise business operating environment, business support and line functions and organization structure, an enterprise business framework of architectures, and business process architectures (value streams) and workflow scenarios, hence four sub-planes. - In FIG. 5,
Tower model 500 includes the mandatory components and their sub-planes. For thestrategic plan 41 component, there may be a strategic business andIT plans 502 sub-plane. For thebusiness architecture 42 component, there may be enterprisebusiness operating environment 504, business support and line functions and organization structure 506, enterprisebusiness architecture framework 508, and business process architecture andworkflow scenarios 510 sub-planes. Forinformation architecture 44, there may include information/data management framework andprecepts 512, business intelligence component processes 514, geo-structural component view 516, and informationapplication software portfolio 518 sub-planes. Application architecture (value stream enablement) 520, geo-structural component view 522, and application software portfolio (systems integration matrix) 524 sub-planes may be a part ofapplication architecture 46. Standards andpolicies 526, logical locationsoftware deployment schema 528, operating and systems requirements andcharacteristics 530, and geo-structural components view 532 sub-planes may be included intechnology infrastructure architecture 48. EnterpriseIT management framework 49 component may include sub-planes of ITsystems management framework 534, IT systems management geo-structural components 536, IT systems managementapplication software portfolio 538, and enterprise ITmanagement organization model 540. - The following describes how the Enterprise Strategic IT Planning Framework Tower model is interpreted and consequently used to create a strategic IT plan. The systematic process of modeling the enterprise through the development of succinct business process and IT architecture models in support of an enterprise's business architecture is described in each description of the Tower model components. The enterprise business architecture is based on a framework comprised of a series of business process models that integrate the numerous business processes into a series of workflow activities that collectively are called value streams. The value streams produce specific results for a customer based on business goals, objectives, critical success factors, and performance metrics.
- The concept for strategic IT planning outlined in this section is based on the premise that there are six fundamental and mandatory enterprise architecture components in every enterprise. The six enterprise architecture components are developed to portray a strategic view of the business while identifying what and where enabling technology should be deployed within business processes. The architecture components are intrinsically linked and are mutually supportive of each other for modeling the enterprise. As previously discussed, the six mandatory architecture components shown in the Enterprise Strategic IT Planning Tower model of FIG. 5 are: Strategic Plans, Business Architecture, Information Architecture, Application Architecture, Technology Infrastructure Architecture, and Enterprise IT Management Framework. The concepts and rationale behind each of the architecture component planes of the Enterprise Strategic IT Planning Framework Tower will be discussed and developed in the following sections.
- The reference models that are contained in each of the component layers are an “icon” or symbol shorthand that represent graphically a great deal of content that can be found in the methodologies, processes, industry models, and intellectual capital. The models in and of themselves are not as important as the implied content behind them. The models are only representative in nature and will vary for each enterprise as to depth and actual content. However, there are certain essential objectives of each model that must be satisfied and will be discussed for each model.
- Based on the framework Tower, a strategic IT plan will achieve the following IT planning objectives. An organization's business architecture for aligning IT with the business will be addressed. An information architecture for operational needs and establishing business intelligence within a corporation for managing itself, conducting economic analysis, and developing business scenarios for expansion or establishing new business activities for competing in the marketplace will be provided. An application architecture that enables and supports business processes (value streams), and ensures that the business operations within the corporation have been fully integrated and optimized for efficiency and effectiveness will be defined. A technology infrastructure architecture in support of the information, application, and enterprise IT system management architectures will be developed. An integrated enterprise system management approach and IT organization framework for ensuring the reliability, availability, and service consistency of a organization's enterprise information system in support of its business operations and services, including extensions to customers, partners, and suppliers will be defined.
- Strategic Plans
- Definition:
- Strategic plans provide the context and guidance that drive the definition of business functions, processes, systems, and organization. Strategic plans define the mission and long range objectives for conducting the business, and the strategies for achieving them. In addition they determine the actions and allocation of resources to meet strategic objectives, allowing for the effective utilization of an organization's investment in time and resources. Each strategic plan serves a specific and useful function. Every enterprise should have at least six fundamental types of strategic plans—Business Plan, Product Plan, Financial Plan, Organization Plan, Marketing Plan, IT Plan
- Purpose:
- Strategic business planning is the process of defining the mission and long-term objectives for the business enterprise and the strategies for achieving them. The strategic IT Plan defines and guides the IT enablement of the business and related plans. The executable roadmaps for implementation and deployment of the strategic plans would normally be found in a business transformation plan (part of the Business Plan) and an IT transition plan (part of a strategic IT Plan).
- Elements:
- Business Plan:
- Vision
- Objectives
- Critical success factors
- Business Strategy (integrated)
- Market segment
- Products and services
- Operating Principles (guiding principles)
- Distribution channels
- Operations (management)
- Organization
- Science and Technology Strategy
- Modernization drivers
- Information Management Precepts
- Technology Guiding Principles
- Financial Strategy
- Business Transformation Plan
- Product Plan
- Organization Plan
- Financial Plan
- Marketing Plan:
- External factors, drivers
- Industry trends and “best practices”
- Market analysis
- Competitive analysis
- Performance gaps
- Brand positioning and Identity
- Advertising and Promotion
- IT Plan
- Business Context
- Enterprise IT Architecture(s)
- Technology Policies
- Transition Plan
- Dependencies:
- Strategic Business Plan:
- Business Vision Statement
- Business Goals and Objectives
- Critical Success Factors
- Science and Technology Modernization Drivers
- Business Performance Metrics
- Business Information Management Precepts
- Business Intelligence Precepts
- Business Operating Principles
- Logical Business Organization Structure
- Rationale:
- Strategic plans provide the context and guidance that drive the definition of business operations, functions, processes, systems, and organization.
- Discussion:
- Strategic business planning is the process of defining the mission and long-term objectives for the business enterprise and the strategies for achieving them. The strategic business plan consists of the following essential elements: vision, objectives, critical success factors, integrated business strategy, market assessment, products and services, operating principles, distribution channels, operation, organization, science and technology strategy, modernization drivers, information management precepts, technology guiding principles; financial strategy, business transformation plan,
- The strategic IT Plan defines and guides the IT enablement of the business and related plans. The executable roadmaps for implementation and deployment of the strategic plans would normally be found in a business transformation plan (part of the Business Plan) and an IT transition plan (part of a strategic IT Plan). An organization's business architecture is formulated in support of the enterprise strategic business plan(s) by developing enterprise value streams of “How a Corporation Wants to Operate in the Future”, and what factors must be considered. It is from the business plans and business environments that the IT drivers are derived and the corporate direction is indicated.
- Business Architecture
- Definition:
- A Business Architecture reflects an enterprise view of what the business must do today as well as in the future to accomplish particular business requirements. This view is based on the business context and the guidance provided by strategic business plans. The business architecture defines the business organization structure, IT investment and expenditure profile, functions, business process architectures (value streams), workflow scenarios, and the enterprise operating environment within which they all exist. It is the business context and business architecture that will provide the rationale for the future enterprise IT architecture baseline and development.
- Purpose:
- The business architecture provides an operational overview of the enterprise business functions and their supporting processes (value streams). The business architecture will be used for understanding and assessing the business processes to effectively identify how information technology can enable an enterprise to meet its business objectives. The enterprise business operating environment provides a high level overview of the environment for designing an enterprise business and IT architecture. This characterization allows for designing the logical enterprise business and IT architectures and understanding the enterprise information and systems environment, defining the geographical requirements for the information, application, infrastructure, and IT systems management architectures, and developing a business and information technology alignment perspective
- Elements:
- Business Drivers
- Business Enterprise Model
- Business Function Process Model
- Logical Location Model(s)
- IT Investment and Expenditure Profile
- Enterprise Business Framework of Architectures
- Enterprise Business Frame—external input/output aggregate
- Value stream aggregates
- Value Stream(s) Architecture Models:
- Event model
- Process architecture(s)
- Environment models Process workflow scenarios
- Dependencies:
- Strategic Business Plan:
- Business Vision Statement
- Business Goals
- Business Objectives
- Critical Success Factors
- Science and Technology Modernization Drivers
- Business Performance Metrics
- Business Information Management Precepts
- Business Intelligence Precepts
- Business Operating Principles and Environment
- Logical Business Organization Structure
- Rationale:
- The Business Architecture identifies the drivers for making IT decisions, captures the primary line and support functions and business processes for aligning the enterprise business and IT towards reaching its strategic purpose, identifies the necessary business process architectures (value streams), and workflow scenarios from which the technology requirements and architectures to support them can be derived, and provides the basis for developing the enterprise logical location software deployment schemas and models. The Business Architecture also provides an overview of the integration required to effectively support the business processes across the enterprise, provides a high-level framework and mechanism for consistently displaying information, application, and infrastructure architecture information in logical location views, defines the models for business critical actions such as facilitating change management and providing a framework for process integration, and presents a geographical view of the logical and physical locations and the relative functions needed to determine the business and logical organizational structure to meet corporate goals and objectives
- Discussion:
- An organization's business architecture is formulated in support of the enterprise strategic business plan(s). For IT planning purposes it is the compilation of essential information about the business that will be the basis for defining how information and technology will be used to support that business. A
business environment 600 within which the enterprise operates as shown in FIG. 6, as an example, is impacted by outside influences. Therefore, these external factors affecting the business must be understood. These influences include the type ofmarkets 602 the business is in or wishes to enter,competitors 604 faced inmarkets 602,government legislation 605 andregulations 606 with which to abide by, parameters placed upon it by aparent corporation 608 or the impact it might have bysubsidiaries 610, services to provide to its customers 612, and accounting to itspartners 614. Inside influences include production of goods, sales, and administration of thecorporation 616. In the development of a comprehensive IT plan these factors could preclude certain choices in the technology selection. - The operating framework can be represented by a Business Function/
Process Model 700 shown in FIG. 7. For discussion purposes, a manufacturing company is used as an example business to model.Model 700 articulates a firm's loose organizational structure and the line business functions and supporting business processes. It allows for a summary view to facilitate an understanding of the relevant functions in the current as well as future enterprise, identifying the existing and potential sources for competitive differentiation and advantage, and provides a way of focusing on areas that could benefit from strategic analysis. The essential objective ofmodel 700 is to depict the current functional view of the enterprise by illustrating the primary line functions, which directly relate to the delivery of the enterprises products and services (e.g. Sales 712, Distribution and Delivery 716) and the supporting functions, which enable the primary functionality (e.g. 706 Finance). The specific content in the individual figures are only representative in nature and will vary for each enterprise. Inmodel 700, a manufacturing company may have different departments to include support functions ofmanufacturing 702,corporate administration 704,finance 706, andinformation technology 708. Primary line function examples includebusiness development 710, marketing andsales 712,customer care 714, and distribution anddelivery 716. Withinmanufacturing support function 702, there may be sections ofmaterial management 720,plant production 722,quality management 724,inventory management 726, design andengineering 728, andplant maintenance 729. Undercorporate administration 704, sections may includehuman resources 730, legal, 732,professional development 734, mergers andacquisitions 736, policies andprocedures 738, andauditing 739. Sections under the finance issupport function 706 may includecorporate accounting 740,treasury 742,asset management 744,risk management 746, andfinancial management 748. Under the informationtechnology support function 708, there may be sections ofIT business management 750,service management 751, systems/network management 752,element management 753,security management 754, telecommuting 756, andpaging management 758. - For primary line functions,
business development 710 may containmarketing development 760, product/services development 762, andbusiness planning 764. Sections under the marketing andsales line function 712 may includeadvertising management 770,marketing management 772, andsales force management 774,literature 776, andpromotions 778. For the customercare line function 714,sales 780,services 782,complaints 784,systems restoral 786,suggestion management 788, andtechnical information 789 groups may be provided. Sections under distribution anddelivery 716 may includeproducts 790,field services 792, andoperations management 794. - The operating environment also reflects a view of the logical and
physical operating environment 800 shown in FIG. 8 within which an enterprise exists and operates.Operating environment 800 illustrates an example of how the components of Business Function andProcess Model 700 may be separated by geographical as well as logical boundaries. This environment will have a direct bearing on the design, engineering, implementation and deployment of IT. - The identification of logical business locations defines the various areas of business activity encompassed by the enterprise. The separation between logical locations may be physical (such as geographic boundaries), or purely logical (such as organizational, cultural, and political boundaries). The definition of logical business locations provides a key ingredient for analyzing IT resource needs and determining the design, implementation, deployment, and management of those resources throughout the enterprise. This view provides input into the distribution of applications as well as the information and infrastructure requirements for the definition of those architectures. A
logical location map 802 provides the necessary correlation between logical and physical locations for the various business functions of the enterprise. In order to support the logical design of IT architectures and consistently illustrate the distributed needs of the enterprise, a geo-structural view 900 shown in FIG. 9, for example, is created from the logicalbusiness location map 802 to provide the template upon which to construct the IT systems management, technology infrastructure, application, and information architectures. This would include the logical locationsoftware deployment schema 3000, as shown in FIG. 30, that will ultimately lead to the physical design of IT solutions. The critical elements of this geo-structural view is the distinct representation of each of the logical operating locations. An operations and support systems center 902 provides communication among mobile users 904,sales offices 906, manufacture operatingunits 908, customer service centers 910,regional offices 912, and teamingpartners 914. Operations and support systems center 902 has access capability tocorporate data stores 916,operational data stores 918, andcorporate headquarters 920. The specific content in the individual figures are only representative in nature and will vary for each enterprise. - An
IT investment profile 1000 example shown in FIG. 10 reflects the company's overall investment in IT and where it is focused. To some degree,profile 1000 illustrates the perceived value the enterprise places on IT. Investment andexpenditure profile 1000 provides a view of the monetary delimiters on the IT operating environment and sets the tone and expectations for future IT expenditure. This will directly impact the feasibility of certain technology choices and recommended IT initiatives to reach targeted architectures and environment. - Capturing the client IT systems expenditure data and determining where it is focused provides the baseline against which the appropriateness of current IT expenditures can be determined and against which transition planning recommendations and future budgeting calculations can be made. FIG. 11 shows an example of a client IT expenditure and
industry expenditure benchmark 1100. It also provides a way in which to determine client standing in regards to an industry norm benchmark for business, competitive, and industry measures. - The enterprise business architecture is key to the business success of a corporation as well as the development of effective strategic IT plans. From the strategic business models articulating the business process architectures (value streams) the requisite enabling technology and information requirements can be derived. The level of detail and accuracy applied to these models will directly impact the robustness of the IT plans that can be developed for an enterprise as well as the success of their subsequent implementation. At the highest level, the business architecture is represented by an
enterprise model 1200 that shows the essential elements of primaryexternal business processes 1295 and therespective inputs 1230 from andoutputs 1208 toexternal sources 1204. As shown in FIGS. 12A-12C, theframe 1202 in the middle of the model represents the client enterprise. This model is an example of a manufacturing industry enterprise and the specific content in the individual figures are only representative in nature and will vary for each enterprise. -
Enterprise frame 1202 handles various inputs and provides various outputs for interfacing with external processes. Anenterprise frame 1202 may create such elements as business leads 1206,literature 1208,discount agreements 1210, request forquote responses 1212, quotes 1214, orders, 1216,customer invoices 1218, fulfilledorders 1220, fulfilledcustomer requests 1222,complaint resolution 1224,packaging material 1226, and rejectedrequests 1228 as inputs tocustomer process 1204. Likewise,customer process 1204 may create elements such as business leads 1206, request forquote requests 1230,customer information 1232,orders 1216,customer payments 1234, and returneditems 1238 as inputs toenterprise frame 1202.Enterprise frame 1202 may receive inputs from a humanresources services process 1240 for such items asinterested candidates 1242 andemployment development services 1244. Agovernment services process 1246 may create items such as EnvironmentalProtection Agency guidelines 1248, Occupational Safety and Health Administration (OSHA)guidelines 1250, and government policies andregulations 1252 for input toenterprise frame 1202. Other processes of the aggregate input/output model 1200 include anemployee support process 1254 that may receivecompensation 1256,benefits 1258,employee information 1260, andreimbursements 1262 inputs generated byenterprise frame 1202 while creatingreimbursement requests 1264 andother employee issues 1260 for processing byenterprise frame 1202. A supply goods andservices process 1266 createsmanufacturing material 1268, supplier capacity andavailability 1270,goods 1272, andvendor invoice 1274 inputs toenterprise frame 1202 while responding tovendor payment 1276 andpurchase order 1278 inputs created byenterprise frame 1202. Asettle payments process 1279 handles electronicfunds transfer payments 1280 and foreign currencywire request inputs 1281 generated byenterprise frame 1202 and provides electronicfunds transfer remit 1282 and foreign currencywire remit advices 1283 toenterprise frame 1202. Alegal action process 1284 handles closedcase 1285 and implemented policy andregulation 1286 issues and generateslegal issues 1287. Astrategic services process 1288 issues science andtechnology drivers 1289,industry trends 1290, andexternal market 1291 data toenterprise frame 1202 for strategic planning consideration. An authorizecredit process 1292 responds to creditcheck requests 1293 withcredit check responses 1294. Similarly, acredit analysis process 1295 responds to creditanalysis requests 1296 withcredit analysis responses 1297. - Identification of value streams within the enterprise will allow the enterprise to establish valued-added services in support of its customers and provide a mechanism for understanding and evaluating results. A value stream can be defined as an end-to-end array of activities that collectively create a valuable result for both internal and external customers. The value streams reconcile all the views a customer may have of the enterprise and create the views of a single, serving enterprise dedicated to the customer. The value streams satisfy the customer wishes as fully as possible, rather than focusing on internal procedures (or functions) such as accounting or selling or shipping.
- The value streams can be grouped into four categories: Customer Facing, People Caring, Business Enabling, and Future Building. FIGS.13A-13D represent a
model 1300 of the aggregation of the processes within a particular category (e.g. Customer Facing) and the external inputs and outputs to support the value streams. This view shows not only the integration within a category but depicts the required inputs and outputs from the other categories within the enterprise as well as sources outside the enterprise such as enablecustomer process 1204 of FIGS. 12A-12C. The elliptical elements such as fulfilledorder 1220 represent tangible objects. The hard cornered or rectangular objects such ascustomer invoice 1218 represent IT objects exchanged with other value streams or external entities. The specific content in the individual figures are only representative in nature and will vary for each enterprise. - In FIGS.13A-13D, enable
customer process 1204 of FIGS. 12A-12C is shown with its inputs and outputs interacting with both internal and external processes, such as order tocash process 1302 andcredit analysis process 1295. An order tocash process 1302 generatescustomer invoices 1218 and quotes 1214 for enablecustomer process 1204 and generatescredit check requests 1293 for authorizecredit process 1292. Order tocash process 1302 also generatesreceivable debit entries 1304 andreceivable credit entries 1306 as well aswork orders 1308 for input to a manufacturing todistribution process 1310. Order tocash process 1302 handlescredit check responses 1294 from authorizecredit process 1292 along withorders 1216 andcustomer payments 1234 fromcustomer process 1204. Order tocash process 1302 also handles Availability toPromise ATP data 1312, scheduledship date 1314,advanced ship notice 1316, advice ofreceipt 1318, and proof ofdelivery 1320 inputs generated by manufacturing todistribution process 1310. Manufacturing todistribution process 1310 generates engineering change reports 1322, manufacturingmaterial demands 1324, andreceipt acknowledgments 1326 along withhandling manufacturing material 1328 and technical manual 1330 inputs. - Technical manual1330 inputs are also processed by a
service request process 1332.Service request process 1332 generatesorders 1216, fulfilledcustomer requests 1222,complaint resolution 1224,packaging material 1226, and rejectedrequest 1228 inputs tocustomer process 1204.Service request process 1332 handles fulfilledorder 1220,customer request 1236 and returneditem 1238 inputs generated bycustomer process 1204.Service request process 1332 also generatescredit memos 1336 anddebit memos 1338.Service request process 1332 generatesfield service reports 1340 for use by order tocash process 1302. Acomplaint 1342 input is generated byservice request process 1332 for processing by manufacturing todistribution process 1310.Complaint 1342 and a business lead 1344 input are generated byservice request process 1332 for use byprospective customer process 1346. -
Prospective customer process 1346 handles business leads 1206 and request forquote requests 1230 fromcustomer process 1204.Prospective customer process 1346 generates business leads 1206,literature 1208,discount agreements 1210, request forquote responses 1212,customer interfaces 1232, andquote 1214 inputs for processing bycustomer process 1204.Prospective customer process 1346 interfaces withcredit analysis process 1295 throughcredit analysis requests 1296 andcredit analysis responses 1297.Prospective customer process 1346 responds tomarketing strategy 1348,pricing strategy 1350, and buyingtrend 1352 information. An engineeringchange order notification 1354 provides input toprospective customer process 1346 and manufacturing todistribution process 1310. Aproduct configuration 1356 drivesprospective customer process 1346, manufacturing todistribution process 1310, and. order tocash process 1302.Prospective customer process 1346 also generates acustomer profile 1358 for use by order tocash process 1302. - Subsequent to the enterprise business value stream aggregation, each of the value streams identified in the enterprise business architecture is further decomposed into event, process, and environment architectures and workflow scenario models. The event models illustrate the activities that happen outside the Enterprise/Value Stream to which the value stream must react in a predetermined manner. The architecture models depict the style and method of design and construction that comprises the elements of a system and defines the purpose and interrelationships of those elements. Each value stream is depicted with at least one process architecture and an environment model. The workflow scenario models illustrate the sequence of activities necessary to transform the inputs into the required outputs.
- FIGS.14A-14B represent an example of a
generic event model 1400 for a value stream such as “Order to Cash”. This concept requires that for each value stream identified in the enterprise business architecture there will be a corresponding event model. The event model articulates each event that triggers a workflow scenario within the value stream. The value stream event metrics matrices capture the number of events that occur over some specified time periods. These events could be either external or internal to the enterprise. For each event identified in the model a logical location software deployment schema will be derived. - In FIGS.14A-14B, the fulfill
order scenario 1401 is initiated by various events including customer cruising theweb site 1402,customer placing order 1404, and credit authority responds to creditcheck request 1406, all of which are external events. Time to invoice thecustomer 1408, is an example of an internal event. Other internal events include time to invoicecustomer 1408, and customer makespayment 1410, order entry sends order tomanufacturing 1412. Subsequently, field service repairorders replacement parts 1414, submitsbilling inputs 1415, shipping provides proof ofdelivery 1416, advice ofreceipt 1418, and Advance Ship Notice (ASN) 1420 as well as operations updates toship date 1422 andATP 1424 to assist in keeping track of the order. The maintain/change order scenario 1550 is driven by the customer changing anorder 1426 or canceling anorder 1428. Authorization to refund an order for fulfillrefund scenario 1514 is given bycustomer service 1430. A review order scenario 1432 processes a customer's review request 1434. The specific content in the individual figures are only representative in nature and will vary for each enterprise. - FIG. 15 represents an example of a
generic process architecture 1500 for a value stream such as “Order to Cash”. This concept requires that for each value stream identified in the enterprise architecture there will be at least one corresponding process architecture. These architectures provide the structure within which workflow scenario models can be derived depicting various business scenarios for that value stream. - In FIG. 15, the essential elements are the work elements being executed as represented by fulfill
order scenario 1401 and the information being created and used as represented bynew order request 1522. In FIG. 15, a fulfillorder scenario 1401 may process fieldservice billing input 1340,product configuration 1356,customer profile 1358,advanced ship notice 1316, advice ofreceipt 1318, proof ofdelivery 1320,customer payment 1234,credit check responses 1294, andATP data 1312 inputs and generates scheduledship date 1314,customer invoice 1218,credit check request 1293,quote 1214, and anorder release 1504. Customer data to consumer intelligence process 1503 drives the information forcustomer profile 1358. Anorder 1216 is generated by fulfillorder scenario 1401.Order 1216 includes information with respect to an order such as being entered 1506, released 1508, invoiced 1510, and paid 1512.Order 1216 may be generated by fulfillrefund scenario 1514 that can create acredit refund 1516 or acustomer credit memo 1518. Fulfillrefund scenario 1514 is triggered upon an indication by approved refund/return 1520. - An
order 1216 is initiated by fulfillorder scenario 1401 in response to anew order request 1522 generated by a directorder request scenario 1524. Directorder request scenario 1524 receives information from an order request generated byphone 1528,fax 1530, orweb page 1532 from acustomer 1534,CSR 1536,account executive 1538, orFSR 1540. Directorder request scenario 1524 may generate areview order request 1542 that initiates areview order scenario 1544 that receives information fromorder 1216 in order to generateorder information 1546. Directorder request scenario 1524 may also generate a maintain/change order request 1548 that provides information to a maintain/change order scenario 1550 in order to perform any alteration toorder 1216. Directorder request scenario 1524 also generates areturn request 1550 for use by fulfillrefund scenario 1514. The specific content in the individual figures are only representative in nature and will vary for each enterprise. - The
environment model 1600 for a value stream, as shown in FIG. 16, depicts the interaction with external entities, as indicated with the darkened hourglass figures, as well as the interfaces with the other value streams of the enterprise. The elliptical spheres in this model represent physical, real world objects. The rectangular or “hard cornered” shapes represent IT objects and therefore integration points between the value streams as well as external entities. These interface objects are the “whats” that are reflected in the Enterprise Information/Application/Systems Management Software Portfolio integration matrices. FIG. 16 shows an overall environment view for the order to cash example as discussed above. - The
workflow model 1700, as shown in FIG. 17, depicts one of the workflow scenarios based on the process architecture. There could be several workflow scenarios for each process architecture and the number of workflow scenarios is directly linked to the events identified in the associated value stream event model. The workflow scenarios actually depict the sequence of activities necessary to transform the inputs into the required outputs. From these granular models, most of the requisite inputs and outputs for the enterprise will be defined as well as the logical applications (either physical or IT) that support the accomplishment of the particular workflow. From these models, the basis for the application portfolios and information architectures are derived. Therefore these models will support the construction and provide the rationale for the IT architectures (e.g. application portfolios) developed in the an enterprise IT Plan. - Information Architecture
- Definition:
- An Information Architecture represents what information must be delivered to individuals across the enterprise to help them effectively execute business processes and make informed decisions. The information architecture plane in the Tower contains the information and data management framework and precepts; the models for the integrated information, application, and systems management architectures; the geo-structural technology components view; and the information-applications software portfolio that address business intelligence scenarios.
- Purpose:
- To provide the business intelligence structure for providing employees with the ability to analyze the performance of a business and its capability to achieve the business goals, objectives, critical success factors, and performance metrics outlined in the enterprise strategic business plan. The information architecture is the cornerstone of an organization's ability to effectively manage information. This capability is critical to the discovery and exploration of information related to the critical factors and trends of a business and its industry.
- Elements:
- Information and Data Management Framework:
- Business Information Management Precepts
- Business Intelligence Precepts
- Information Needs and Uses
- Information Sources
- Integrated, Application/Information/Systems
- Management Architecture:
- Business Intelligence Scenarios
- Information Technology Architecture—Geo-structural Component View
- Information-applications Software Portfolio
- Dependencies:
- Business Goals and Objectives
- Critical Success Factors
- Business Performance Metrics
- Science and Technology Modernization Drivers
- Business Operating Principles
- Enterprise Operating Environment
- Business Architecture
- Rationale:
- The Information Architecture provides focus on the operation of business processes and their interaction with other business functions and processes (value streams) within the enterprise, provides the ability to continually evaluate business performance and productivity and readily identify business directions for ensuring achievement of business goals, objectives, critical success factors, and performance metrics, and provides business intelligence and value-added information for strategic decision making. The Information Architecture also effectively consolidates both macro and micro information requirements and perspectives of the organization to insure information and data integrity and helps assure compatibility between informational and operational transaction systems.
- Discussion:
- A corporation's enterprise information architecture for enabling business intelligence is characterized by a framework that establishes decision making principles, precepts, and standards for the identification and use of information as a business resource, identifies the business intelligence scenarios within business value streams, identifying the high-level inputs and outputs, occurring in the enterprise from internal to external sources, to include those being generated by both legacy and client/server systems. The framework includes a data warehouse structure that provides the necessary high-level management and operations reports. The framework facilitates the establishment of the underlying infrastructure for managing the information asset by highlighting the required information databases and information-application components, provides a supporting application portfolio and system integration table for identifying the business intelligence applications and integration requirements, and provides a geo-structural view for relating the information and data architectural components to their corresponding logical and physical locations
- FIG. 18 shows an information and data management framework and
precepts 1800 of the enterprise. The definition of an enterprise's information architecture includes several views that describe the information needs and uses, its owners and users and management, the forms the information is stored in and the information sources. The information and data management framework establishes decision making principles, precepts, and standards for the identification and use of information as a business resource. Also part of the framework is understanding the informational needs of the operational (tactical) side and the informational (strategic) side. - In FIG. 18, information needs and uses1802 of the enterprise is driven by
decision support 1804,business alignment 1806, and operations support 1808.Information management 1810 is controlled throughknowledge management 1812,access management 1814, andstorage management 1816.Information sources 1818 includeinternal sources 1820 as well asexternal sources 1822. - FIG. 19 shows an example of
business intelligence scenarios 1900 for the enterprise. As a result of the overall strategic business plan and its supporting business architecture, an enterprise information architecture is required for providing business intelligence on both the internal and external business environment. For example this architecture should enable a business to explore sales, profit, forecasts, and what-if information. The information requirements (inputs and outputs and the relationships with other applications as well as value stream requirements) are identified and articulated in the enterprise strategic business models found in the enterprise business architecture. Depending on the business operating philosophy of an enterprise, the business intelligence scenarios can be designed to allow the empowerment of information-based employees throughout the enterprise. They can provide them with the ability to analyze the operations and performance of the business in accordance with established policies and rules. From available information employees should be able to identify trends within and without the enterprise and determine the required changes in response. - Finally, the enterprise information and data architecture is mapped into a geo-structural view. FIG. 20 provides an example of a geo-
structural component view 2000. This view maps the information and database components of the enterprise to the pertinent business functions of the firm. The geo-structural view shows the logical location of the information and data architecture components that must be integrated and supported by a technical infrastructure. This layout will be used to develop a supporting logical technology infrastructure architecture. - In FIG. 20, information for the enterprise is controlled by an
enterprise data warehouse 2002.Enterprise data warehouse 2002 may include a data query andreporting function 2004, a DSS/EIS 2006, adatabase management system 2008, adata mining function 2010, ametadata function 2012, a replicatefunction 2014, adata administration 2016, and adata processor 2018.Enterprise data warehouse 2002 has access to operational databases 2020, either internalcorporate data stores 2022 or externaloperational data stores 2024, overnetworks 2026. Information is exchanged overnetworks 2028 byenterprise data warehouse 2002 withcorporate headquarters 2030, mobile/small office users 2032, and regional/customer support/saleslarge office 2034 workstations. Aregional data mart 2036 may support large office communications. - Based on the databases that are required to enable business intelligence, an enterprise information and data technology data warehouse framework is formulated that identifies all the business transactions that are occurring within the enterprise from both internal and external sources. In addition the architecture identifies all of the pertinent high-level management and operations reports. This framework is oriented around the transaction and information components required to develop a data warehouse capability and enabling business intelligence within a corporation. FIG. 21 provides an example of a
data warehouse framework 2100. - In FIG. 21,
enterprise data warehouse 2002 operates arounddatabase management system 2008 that processes data to and from internalcorporate data stores 2022 and externaloperational data stores 2024.Data processor 2018 performs data extraction and scrubbing betweendatabase management system 2008 anddata stores Database management system 2008 interfaces withmetadata 2012 anddata administration 2016 in order to execute DSS/EIS 2006, replicate 2014, anddata mining 2010 applications. - In support of the business intelligence scenarios, an information-application portfolio must be identified to provide the necessary operational and management reports as well as accessing the appropriate data for other information systems. FIG. 22 provides an example of an enterprise information application portfolio and
system integration matrix 2200. This matrix identifies for each of the value streams the enabling application components that should be integrated and is derived from the business process architectures and workflow scenarios. This matrix will also be found in the application architecture and enterprise IT systems management architecture because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident. - Application Architecture
- Definition:
- An Application Architecture serves to support business process execution (value stream enablement) and bring information and data to the process. The application architecture defines the application software portfolio and integration relationships. Application inputs and outputs are identified as well as the application geo-structural view for deployment. Guiding principles, standards, and design characteristics support the acquisition as well as development of applications.
- Purpose:
- To provide a logical portfolio of applications for supporting the various business processes of an enterprise. The application portfolio is designed to illustrate the optimum distribution of applications and components across multiple business functions, processes, sites and platforms for enabling business workflow scenarios that will insure efficient and effective business operations.
- Elements:
- Integrated Application/Information/Systems Management Architecture (Value Stream Enablement Views)
- Application Portfolio Architecture—Geo-Structural Component View
- Enterprise Application Software Portfolio Integration Matrix
- Dependencies:
- Business Goals and Objectives
- Critical Success Factors
- Business Performance Metrics
- Business Information Management Precepts
- Business Intelligence Precepts
- Science and Technology Modernization Drivers
- Business Operating Principles
- Logical Location Models Business Architecture
- Enterprise Operating Environment Characterization
- Rationale:
- The Application Architecture identifies the appropriate enterprise business applications and the integrating requirements to support the business process architecture (value streams) and workflow scenarios, provides a means to incorporate business policies, processes, procedures, and rules to effectively operate and manage the enterprise, provides an organization the ability to streamline and integrate the operation and management of its business processes, and identifies the application portfolio and technology infrastructure requirements.
- Discussion:
- In support of the overall strategic business plan and its supporting business architecture, an enabling application portfolio and architecture is required for performing business operations. The application architecture identifies the logical applications required for optimizing business operations and the logical locations of those enabling applications. An enterprise application architecture consists of a portfolio of applications that enable the value streams and associated workflow scenarios. The application architecture addresses the combination of functional software applications that must be integrated to enable the business process value streams and the workflow scenarios outlined in the business architecture. The integrated application portfolio should empower the information-based employees within the company to manage the day-to-day operations of the enterprise, and allow management and business analysts to concentrate on analyzing and operating the business. A corporation's enterprise application architecture will be characterized by the required application components for enabling the enterprise value streams, a geo-structural view for relating the application architectural components to their corresponding logical and physical locations and organizational structures, and integration requirements for applications.
- Identification of business enabling applications can be derived from the value stream process architecture and workflow scenario models that comprise the enterprise business architecture. In addition these models highlight the cross functional relationships with other applications and consequently identify the applications that must be integrated as well as the information and data that is passed between them as inputs and outputs. FIG. 23 provides an example of the
application architecture 2300 for order to cash. This view correlates the required logical application inputs and outputs to the value streams they support. Based on the required logical applications, an enterprise application software portfolio table is formulated to show the applications that must be integrated. - The enterprise application portfolio is then summarized into a geo-structural view. FIGS.24A-24B provide an example of geo-structural view 2400 for a generic manufacturing company. This geo-structural view shows the logical location of the logical application portfolio components that must be integrated through a technical infrastructure in order to form the required, integrated, corporate enterprise business system.
- FIGS.24A-24B, applications for an enterprise are supervised by an
enterprise server farm 2402.Enterprise server farm 2402 includes servers forservice management 2404, sales andmarketing 2406,financial accounting 2408,product planning 2410,material management 2412,asset management 2414, logistics anddistribution management 2416, QA/QC/QM management 2418,human resources 2420,complaint management 2422, legal andsafety 2424,corporate management 2426,office automation 2428,web 2430 andothers 2432. Anexternal request processor 2434 handles server access to internal corporate data stores throughenterprise data warehouse 2002,regional data mart 2036, andinternal databases 2022.External request processor 2434 may also provide server access toexternal databases 2024 andexternal client workstations 2436. Aninternal request processor 2438 provides server access to client work stations at large regional/sales offices 2034, mobile/small users andoffices 2032, andcorporate headquarters 2030 either directly or through anoffice application server 2440.Office application server 2440 may includeprint 2442,file 2444,post office 2446, andoffice automation 2448 functions. Client workstations may include workflow/collaboration replication 2450,application presentation 2452, andweb applications 2454 capabilities. - FIG. 25 provides an example of a
template 2500 for capturing an enterprise application portfolio. This matrix is derived from the business process architectures and workflow scenarios. This matrix will also be found in the information architecture and enterprise IT systems management architecture because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident. In support of the enabling applications portfolio, a corresponding application portfolio “best practices” recommendations table can be developed that highlights “best of breed” products. PIPE or a similar process is the logical extension of making integrated technology recommendations. - FIG. 26 provides an example of a recommendations table2600 that could be derived that highlights the “best of breed” products for enabling business processes.
- Technology Infrastructure Architecture
- Definition:
- A Technology Infrastructure Architecture enables access to information and provides support for the execution of activities. This plane contains the standards and policies or “building codes” for infrastructure construction. This plane also contains the logical location software deployment schemas as well as a characterization of the infrastructure environment to provide the base line for the target environment. It also provides identification and views of the future geo-structural layouts with IT platform operating requirements and characteristics that will provide the basis for engineering blueprints and deployment.
- Purpose:
- The enterprise technology infrastructure architecture provides the technology structure to support the information, application, and enterprise IT systems management architectures. The infrastructure architecture describes the underlying systems and associated platforms to integrate the business intelligence and business application portfolios into an enterprise information system.
- Elements:
- Standards, Policies, and Governance
- Logical Location Software Deployment Schemas
- Operating and Systems Requirements and Characteristics
- Technology Infrastructure Architecture—Geo-structural Component View (with Linkages to Lower Level Technical Component Architectures)
- Dependencies:
- Business Goals and Objectives
- Critical Success Factors
- Business Performance Metrics
- Business Information Management Precepts
- Business Intelligence Precepts
- Science and Technology Modernization Drivers
- Business Operating Principles
- Logical Location Models
- Business Architecture
- Enterprise Operating Environment Characterization
- Information/Data Architecture
- Application Architecture
- Rationale:
- The Technology Infrastructure Architecture provides the supporting platforms and technology structure for information-empowered employees (e.g. business analysts, knowledge-based marketing and sales agents, operations and support system managers, and corporate executives) within an enterprise. The Technology Infrastructure Architecture also produces the technical structure for a seamless flow of information throughout the business enterprise to support enabling business processes, helps leverage economies-of-scale for IT procurement, improves the quality and efficiency of IT support, and eases integration efforts through technical consistency.
- Discussion:
- In support of the information and application architectures, and IT system management framework, an underlying technical infrastructure architecture must be defined. The infrastructure architecture addresses the systems and networking structures that support the application portfolios that enable the value streams and workflow scenarios outlined in the business architecture. The infrastructure framework allows common and consistent operating environments to be established. The infrastructure architecture identifies and graphically depicts the underlying networking structures and associated platforms, operating systems, and protocols that enable the information, application and systems-management systems. The technical infrastructure architecture is characterized by highlighting in the corporation's enterprise infrastructure view the required system components for enabling the value streams and ensuring effective and efficient performance of these systems, establishing a common operating environment that will standardize operating practices throughout the enterprise and allow for ease-of-use and ease-of-training of end users, and developing a supporting Technical Infrastructure “Best Practices” Recommendations table or process that highlights the “best of breed” products for integrating the firm's enterprise information systems that allow for optimizing and controlling costs.
- A technology policy, based on The Open Group Architectural Framework (TOGAF) model, (see the
technical reference model 2700 in FIG. 27) is a vehicle to articulate consensus and provide a basis so that those involved in making decisions concerning acquisition and application of various technologies will have adequate and appropriate information on which to base their decisions. Technology policies provide guidelines on which technologies to use and which to avoid and recommends specific tools, vendors, or systems when appropriate, and establish a common operating environment that will standardize operating practices throughout the enterprise and allow for ease-of-use and ease-of-training of end users. - A technology policy will be characterized by providing an overview of each technology, making statements of policy concerning the specified technologies and provides details on the components involved, providing a time frame for the deployment of recommended technologies, providing guidelines for decisions or recommendations of specific tools, and documenting current views on technology and communicating a consistent technology direction.
- In FIG. 27,
Technical reference model 2700 includesapplication software 2702 that executes onapplication platform services 2704 through anapplication programming interface 2706.Application platform services 2704 encompasses items such asdata interchange 2708,data management 2710, distributedcomputing 2712, graphics andimaging 2714, international operation 2716,network 2718, operating system 2720,transaction processing 2722,user interface 2724,security 2726, and system andnetwork management 2728. Access toapplications platform services 2704 is provided tocommunications 2730,information exchange 2732, andusers 2734 of an external environment through anexternal environment interface 2736. - A Primary Integrated Platform Environment (PIPE)
framework 2740 includes PIPE applications fordesktop 2742,workstation 2744, workgroup/campus server 2746,enterprise server 2748, andmainframe server 2750. Structures for thePIPE framework 2740 includeapplications development 2752,systems management 2754, andnetwork management 2756. - When possible, standards are listed in addition to specific products that comply with the stated standards. The technology policy is meant to provide technology direction. The focus is on core standards that can be used as the foundation for information technology implementations. A PIPE type process should work in hand with the technology policies. The PIPE process and strategy of selecting, refreshing, testing and certifying IT products and platforms will insure a validated, consistent, and integrated compute environment.
- In order to arrive at the consolidated technology infrastructure architecture a series of models are derived from the models created in the business architecture. The logical location connectivity model, depicted in FIG. 28 connects the logical locations identified in the business architecture with the input media for each event found in the value stream event model to the logical application software identified in the application architecture.
- In FIG. 28,
connectivity model 2800 is separated intological locations 2802,event medium 2804,application portfolio 2806, andtechnology infrastructure 2808. Logical locations includemobile users 2810,customers 2812,customer service 2814,corporate headquarters 2816,regional offices 2818, field sites 2820, warehouses 2822, manufacturing plants 2824, and partners/providers/suppliers 2826.Event medium 2804 includeslaptop computers 2830 to allow mobile users access toapplication portfolio 2806 through a public switchednetwork 2832.Customers 2812 gain access toapplication portfolio 2804 via public switchednetwork 2832 usingtelephones 2834 and byfax 2836.Customers 2812 may also be given access via aninternet network 2838 using aworkstation 2840. Access toapplication portfolio 2806 for otherlogical locations 2802 may be throughworkstations 2842 or anextranet connection 2844. -
Logical locations 2802 access specific applications in theapplication portfolio 2806 dependent upon the triggering event in the value stream. Applications withinapplication portfolio 2806 may include enableservice management 2850, enablecall management 2852, enablefax management 2854, enableweb management 2856, enableproduct configuration 2858, enable enterprisecorporate management 2860, enableorder entry 2862, enablelogistics 2864, enablescheduling 2866, enablemanufacturing 2868, and enableaccounts receivables 2870. Content and supervision ofapplication portfolio 2806 is performed bycorporate networks 2872 in conjunction with asecurity component 2874 andenterprise departments 2876 intechnology infrastructure 2808. - The logical location connectivity model is created for each value stream. Aggregation of these models is accomplished by mapping the logical applications identified for each logical location into the
matrix 2900 in FIG. 29. The logical applications are grouped into logical software components equivalent to software that can be readily obtained as commercial off the shelf. These logical software components set the initial basis for the software deployment over a geographical or logical area. By taking the individual logical location entries found in FIG. 29 and modeling each instance, as shown in FIG. 30, the engineering premise begins to emerge that upon consolidation gives the technology infrastructure geo-structural component view. - In FIG. 30, modeling of a simplified
logical software deployment 3000 for amobile user 2810 is shown.Mobile user 2810 may interface withcustomers 2812, which would require access to specific software applications within the enterprise.Mobile user 2810 gains access to logical software components throughlaptop computer 2830 or other workstation andcorporate networks 2872. Logical software components may includesecurity 2874, enterpriseinformation technology management 3002,office automation 3004,enterprise customer management 3006,human resources 3008,sales force automation 3010, andother enterprise components 3012. - FIGS. 31 and 31A-31D provide an example of a technical infrastructure logical/
physical view 3100. This view correlates the required system components and infrastructure requirements of the enterprise for enabling the value streams and workflow scenarios to the logical location maps and templates from the business architecture plane. From the logical infrastructure depictions in FIGS. 31 and 31A-31D coupled with the logical location deployment schemas, the lower level technology component architectures (e.g. internet) can be identified and consequently engineered. The logical location software models and the consolidated technology infrastructure architectures identify the logical applications that need to integrate and operate together, portray the enabling operational elements, processes and technology components for achieving the desired operating results based on the organization's business goals, objectives, critical success factors, and performance metrics, and highlight the system integration requirements in support of the information, application, systems management, and infrastructure architectures. - In support of the underlying technical infrastructure architecture, a corresponding “best practices” recommendations table3200 highlights the “best of breed” products for integrating the firm's enterprise applications and information systems. FIG. 32 provides an example and might be derived from a process like PIPE and directed by the technology policy. The product recommendations are not considered to be part of the Tower but are depicted here to illustrate how they might be derived for a particular enterprise.
- Enterprise IT Management Framework
- Definition:
- The Enterprise IT Management Framework outlines the operational and business management of providing IT resources. The Framework consists of guidelines to manage the client relationships, the management of services, establishing an application selection and development process, and identifying approaches for systems and network management, and systems element management.
- Purpose:
- An enterprise IT management framework provides for the exchange of IT systems management information with information technology systems and services within a corporation's enterprise. Additionally it provides the structure to define optimum value to the client by defining demand, products and services, fulfillment of demand, and the planning and managing of all aspects of IT. The IT systems management framework ensures the reliability, availability and serviceability of information services and systems. This architecture allows a corporation to plan, monitor, and manage enterprise information technology resources in a consistent manner. These resources include people, heterogeneous networks, communications systems, servers, desktops, applications, and databases.
- Elements:
- IT System Management Framework
- ITU-T System Management Business Model
- IT Systems Management Workflow scenarios
- IT Systems Management Technology Architecture—Geo-structural Component View
- IT Systems Management Software Portfolio (Systems Integration Matrix)
- Enterprise IT Management Organization Model
- Dependencies:
- Business Goals and Objectives
- Critical Success Factors
- Business Performance Metrics
- Business Information Management Precepts
- Business Intelligence Precepts
- Science and Technology Modernization Drivers
- Business Operating Principles
- Logical Location Models
- Business Architecture
- Information/Data Architecture
- Application Architecture
- Technology Infrastructure Architecture
- Rationale:
- The Enterprise IT Management Framework helps to manage the resources of the IT business relationships with the client and external service suppliers or operating partners and monitors, manages, and addresses the actual delivery of the enabling IT services to the client and any partners. The Enterprise IT Management Framework ensures high availability of information technology services. The Enterprise IT Management Framework provides the IT network and system management capability to monitor, manage, and maintain the efficient and effective performance of the enterprise information system and its supporting communications networks. The Enterprise IT Management Framework also monitors and manages the availability and operational status of critical elements, components, and devices within the enterprise information system in a consistent, continuous and constant manner.
- Discussion:
- The enterprise systems management structure will assure that IT services will be defined accurately and delivered in a dependable manner. The architectural framework discussed within this section outlines an enterprise systems management capability for ensuring the reliability, availability, and serviceability of a corporation's enterprise information system. The successful planning and execution of this framework will provide significant value to the enterprise by utilizing IT to enable business processes and allow more effective decision making.
- The IT systems management framework is created to support a corporation's information, application, and infrastructure architectures, as well as the services the IT organization provides. The ITU-T Systems Management Business Model shown in FIG. 33 outlines the functional areas that IT management must perform well to effectively become a business partner with their client. This model will help to define the processes to allow IT to become an integral and valued component of the enterprise and a means to a competitive advantage.
- In FIG. 33, the
business model 3300 includesbusiness management 3302,service management 3304, systems/network management 3306, andelement management 3308. The components ofbusiness model 3300 will allow a business to interface with customers 3310 and suppliers/providers 3312 in an effective manner. - Based on the enterprise business models, the IT management processes, and workflow scenarios can be identified that are required for ensuring that system performance is achieved and information services delivery are met based on Service Level Agreements. Subsequently, each of the systems management scenarios identified will have its associated IT systems management process architectures and
workflow scenario models 3400 as shown in FIG. 34. The models will show the integrating activities and their associated operating inputs and outputs required for insuring that the enterprise operating environment is available and functional. The major systems management workflow scenarios are distilled into the following major categories: Set IT Service Expectation, Monitor IT, Respond to IT Situations, and Analyze IT Services. The integrated application/information/systems management process architectures and the supporting workflow scenario models will identify the logical IT organizational functions and systems that need to operate and integrate together, portray the enabling operational elements, processes and technology components for achieving the desired delivery of services results based on the corporation's business. goals, objectives, critical success factors, and performance metrics that have been documented in Service Level Agreements, and highlight the system management requirements for ensuring that system performance is achieved, the highest reliability level of the enterprise information system is attained, and information services delivery are met based on Service Level Agreements. The integrated application/information/systems management process architectures models will then become the mechanism for ensuring a mutual understanding of what needs to be done among the IT business managers, process owners, and IT system administrators and operators. These models will identify the necessary common technological components required for managing the enterprise information system across the entire enterprise operating environment through employment of IT workflow management practices and technological components. - An enterprise systems
management technology architecture 3500 shown in FIGS. 35 and 35A-35C can be constructed to depict the technology layout based on the ITU-T SystemsManagement Business model 3300 and mapped to the logical location maps of the enterprise. The geo-structural view highlights where the enabling application architectural components of the Enterprise Systems Management Software Portfolio are logically located within the enterprise. The geo-structural view shows the logical location of all the logical systems management application components that must be integrated together through a technical infrastructure to create the required, integrated, corporate enterprise systems management environment. - In FIGS. 35 and 35A-35C,
element management 3308 ofbusiness model 3300 includes sales/manufacturing locations 3502,customer service centers 3504, corporate/regional headquarters 3506, and operations centers 3508. Each location ofelement management 3308 may include managementinformation base agents 3510,enterprise servers 3512,database servers 3514,hubs 3516, ATM switches 3518,routers 3520,office servers 3522,gateways 3524,mainframe 3526, anddesktop computers 3528.Element management 3308 communicates with systems/network management 3306 over anetwork 3530. Systems/network management 3306 may include at anoperations center 3532 havingperformance management 3534,event management 3536,configuration management 3538, and systems support 3540 functions. Event management may further include systems monitoring 3542,network monitoring 3544, andfault management 3546. Systems support 3540 may haveobject management 3548,print management 3550directory services management 3552,time management 3554 software/media management 3556,security services 3558 andweb server management 3560. -
Business management component 3302 is divided into customer relations management 3562 and supplier/services relations management 3564. Customer relations management 3562 may include departments such asservice definition 3566,financial accounting 3568, forecasting/reporting 3570, auditing 3572,risk assessment 3574, andbusiness continuity planning 3576. Supplier/services relations management may includeservice planning 3578,technology planning 3580, andresource planning 3582.Service management 3304 is divided into customer assistance/care 3584 andservice support 3586. Customer assistance/care includeshelp desks 3588 anddesktop management 3590.Service support 3586 includesstorage management 3592,change management 3594,problem management 3596,security administration 3598 andworkload management 3599. - Based on the identified logical systems management applications that are required to enable the IT systems management processes and workflow scenarios, an integration table3600 as shown in FIG. 36 is formulated that identifies the array of systems management applications that must be integrated together as well as with other applications. This matrix will also be found in the information architecture and application architectures because there is the possibility of cross functionality integration requirements. If this should occur, using the same matrix will make it evident.
- The final geo-
structural view 3700 as shown in FIG. 37 is of the Enterprise IT Management Organizational framework to illustrate the logical and physical locations of the various organizational components that manage the IT systems and resources. In FIG. 37, aservice management center 3702 communicates with internalcorporate data stores 2022 and externaloperational data stores 2024 over networkadministrative busses 3704.Service management center 3702 processesnetwork administration data 3706 to and fromcorporate headquarters 3708,customer service centers 3710,large sales offices 3712,small sales offices 3714, andmobile users 3716 either directly or throughregional offices 3718. Each location may include a local area network andtelephony administrator 3720 and adesktop administrator 3722. - FIGS.38A-38B depict the IT
organizational model 3800 from which the IT organization areas can be identified and modeled. Anexecutive board 3802 includesbusiness unit partners 3804 andIT governance 3806.Executive board 3802 provides strategic business direction and value needs and IT governance, policy, and approvals in response to IT leadership and innovation, strategic direction, solutions plan, investment and opportunities and business value results inputs from the enterprise. The enterprise performs a manage/deliverIT value function 3808 that uses an ITsupply chain model 3810 with plan/manageinformation technology 3812, assessdemand 3814, develop products, services, and processes 3816, and fulfilldemand 3818 links. Manage/deliverIT value function 3808 generates IT products and IS services for stakeholders andbusiness clients 3820 in response to collaboration, service needs and metrics, and business process innovations developed with them. Manage/deliver IT value function is driven byTower model 500 in conjunction with the people andculture 3822 of the enterprise and itsIT partners 3824.IT partners 3824 provide products, experience, trends, services, staff, innovation, and expertise to assist the people andculture 3822 of the enterprise to implement IT development and delivery. Aspects of the people andculture 3822 of the enterprise that are important both individually and to the enterprise include identification ofcore competencies 3826, roles andresponsibilities 3828, traits andbehaviors 3830 skills andknowledge 3832, learning reflex 3834,incentives 3836, and performance practices 3838.Tower model 500 provides abusiness context 3840,IT change initiatives 3842, ITstrategic direction 3844, ITinnovation solution sets 3846, andIT industry knowledge 3848 in order to deliver the enterprise's IT value. - Building an Enterprise Strategic IT Plan
- The main purpose of the Enterprise Strategic IT Planning Framework Tower model is to identify all of the components and elements necessary to define an enterprise IT architecture and develop an IT plan that is strategically aligned with an organization's business direction. In addition, the Tower contains reference models representing each component element. Approaches and work patterns employing the appropriate processes, and methodologies will then work towards building, modifying, enhancing, and appropriately consolidating the suggested content of the models into a desired result. The result or deliverable is wholly contingent upon what requirements are to be met by the plan. What models are contained in the deliverable are dependent upon the state of the existing and future environments addressed by the planning initiative. For example, if the application architecture has already been defined by a previous business architecture and transformation initiative then this part of the plan will not have to be recreated and “delivered”. If the same initiative provided the appropriate business models and requisite information required by the Tower then those models will suffice and will not have to be rebuilt.
- To define and build a target enterprise business or IT architecture or strategic IT plan the requisite framework components from
Tower model 500 must be identified and assembled into a “blueprint” 3900 that will define the desiredresult 3902 as illustrated in FIG. 39. Based on the blueprint, an approach and work pattern can be developed that will incorporate the appropriate techniques or methodologies to service a particular need or deliver a desired result. It is a basic tenet of the framework that the component blueprint is fundamental and static, but the approach and consequent work pattern and processes or methodologies employed to address the blueprint is dynamic and will vary depending on technique(s) employed, level of client architecture maturity, completeness, sophistication or need. For example, the blueprint for a strategic IT plan is always the same, comprised of the same fundamental framework components as shown in FIG. 40, but the condition or existence of the blueprint components can vary from client to client, organization to organization. Each situation will have to be addressed on a case by case basis and the appropriate work pattern developed to accomplish the desired results. The model in FIG. 40 details the framework components needed in a comprehensive strategic IT plan to obtain anIT transition plan 4000. The appropriate Tower components are identified and relationships determined that will allow for the development of a strategic IT plan. - As mentioned earlier, the condition or even existence of the client's architectural components can vary from client to client, organization to organization. Each situation will have to be addressed on a case by case basis and the appropriate approach and work pattern developed to accomplish the desired results. However because a strategic IT planning blueprint is relatively static, the blueprint can also be used as an assessment benchmark, by using the technology policy and
standards 4002, Tower definitions, and reference models as the baseline. This baseline is then compared with the actual architecture components a particular enterprise currently has in place to determine if they need to be created or already exist or need revision. FIG. 41 is a graphical depiction of how a blueprint may ultimately guide the formulation of the target model. - In some cases, the information that should be in a model exists in multiple formats or sources that are not easily accessible or interpretable. Most often, architecture information is in the minds of the IT organizations and is seldom documented. The blueprint identifies what components will be in the target model so that it can be populated by the IT Strategic planning effort. It is critical that the blueprint is established at the front end to define the scope of the initiative. No matter which approach, process, methodology, or technique is used in the construction of deliverables from the blueprint depicted in FIG. 40, the indicated blueprint components (the “what”) are all mandatory considerations in the development of a comprehensive strategic IT plan. The “how” and the practice of getting the desired result is addressed in the development of the approach and work pattern.
- In order to create an effective work pattern, a strategy and approach must first be conceived that defines and delimits what needs to be accomplished (deliverables) and consequently what framework components of the blueprint need to be addressed. As dictated by the approach, a work pattern can be defined and the elements and reference models can be selected for each of the components that need to be addressed according to the planning initiative requirements. For example if a high level application architecture is all that is required, the detailed models derived from the business architecture will most probably not need to be developed with all of the detailed inputs and outputs as indicated by the Tower. Therefore the framework Integrated Application/Information/Systems Management Architecture (Value Stream Enablement) reference model may be all that is required. But in every case the blueprint will insure that what ever is built is in context with the whole enterprise architecture.
- A simplified example of the thought process behind developing a blueprint of the components required for a strategic IT plan and an approach is as follows. The business goals, objectives, operating principles, business strategies, external influences, and critical success factors (found in the strategic business plan) for a chosen industry or client dictate the functions that must be performed, and from these are derived the business requirements to meet those needs. Processes (value streams) are created or evolve from these requirements to accomplish what the business or organization plans to do. The business requirements and all of the business issues found in the strategic business plan, the current business environment, and the business architecture in turn drive the technology choices, implementation staging, and integration requirements to enable the appropriate processes.
- An enterprise's overall business strategies are the drivers of the IT organization. The IT organization then develops its own strategies, which determine the IT organization's product, service, and fulfillment approach. Technical specifications to accommodate the technology requirements, products, services, and processes are directed and governed through the technology policy which articulates IT principles, policies, and standards that guide the evolvement and deployment of the technology portfolio. The technical requirements satisfying the business requirements provide the guidelines for the development of the enterprise information, application, and infrastructure architectures. Based on the architectures and all of the other operating environment characteristics the enterprise IT management framework will deal with the business and organizational management of providing IT services, the management of the services, IT systems and network management, as well as asset and element management.
- The blueprint components selected from the Tower must then be evaluated depending on customer needs, pre-existing conditions, IT and business environments, and maturity of existing client architectures and frameworks. Upon that evaluation an approach and work pattern can be developed to correlate components into a unified whole for a specific purpose and result. In the case of a strategic IT planning work pattern, the result will be a strategic IT plan that includes the appropriate business and technology architectures and frameworks and a roadmap on how to get from the current environment to the target environment. FIGS.42A-42B graphically depict how a strategic IT planning approach is constructed from the strategic IT plan blueprint in conjunction with the previous description of the intent behind the IT planning strategy.
- FIG. 43 is a model that illustrates how the passing of selected components of the framework, based on blueprints and an approach created for a specific purpose, through work patterns results in architectures and plans (deliverables) consistent with the blueprint and approach. Through the implementation of the deliverable(s), that is to say the implementation of the recommendations and initiatives typically found in the transition plan, the client can realize the intended target enterprise environment. It should be reiterated that the state and existence of different client environments and architecture components in the current enterprise might dictate a different outcome in each case. The existing components as illustrated in FIG. 41 and those tailored for certain industries, or clients will also vary the outcome. For example, the Tower components passed through work patterns will deliver different results for the telecommunications industry as opposed to the health care industry.
- The development of the detailed work pattern can begin once the appropriate IT planning blueprint has been decided upon, the blueprint components selected from the Tower model are evaluated depending on customer needs, pre-existing conditions, IT and business environments; and maturity of existing client architectures and frameworks, and the planning strategy and approach is determined. The detailed work pattern will correlate the contents of the components, elements, and associated reference models into a unified whole for a specific purpose and result or set of deliverables. Basically the process of defining the activities and inputs and outputs of the “population” of the Tower reference models is begun.
- There are many ways to define the activities of a work pattern. One might be the development of a simple list of the perceived tasks that need to be performed. Another might be the definition of the deliverables that are desired and ad hoc activities undertaken to fulfill the demands of the deliverables. The most precise and accurate way of approaching the development of a work pattern is through the use of modeling. Modeling is a graphical technique for articulating the events that need to occur based on an understanding of the inputs and outputs and the relationships between those inputs, outputs and activities to deliver desired results. The preferred modeling methodology is to follow the business process reengineering concepts of decomposing the business architecture into value streams, value stream architectures, and workflow models and using Visual Design Language (VDL) as the architecture and work flow notation. The value stream decomposition is focused on inputs and outputs and is very structured, and VDL, using a very rich syntax, very capably articulates the results of the modeling effort. Although any modeling technique or language can be used, value streams and architectures and VDL are used in the examples.
- In order for the work pattern to be of use, inputs and outputs, processes, tasks, and the relationships between them must be illustrated. In addition an architecture for the process must be defined to bound the domain of the process and allow for a complete understanding of the contents (inputs and outputs) of the process. This also allows for a lexicon (dictionary) to be developed that will tie directly back to the Tower model and the components, elements, and reference models therein and allow for great clarity in understanding what is being addressed. Value stream decomposition also uses a layering technique or breakdown structure to help view the information holistically at the top layer all the way down to the detail that comprises the whole at lower layers or levels. This allows for the diagrams or models produced to more easily communicate complex flows and relationships. This method is very similar to what is often referred to as work breakdown structure.
- Definition of modeling rules can be found in Appendix1: Modeling Rules and Guidelines. A full listing of VDL syntax can be found in Appendix 2: Visual Design Language Syntax Summary. Some key VDL syntax is listed below in order for the casual reader of this document to be able to understand the Strategic IT Planning VDL workflow model presented in FIG. 44.
- Input/Output—represent patterns and nouns or objects that either are used as information or a component that is used to produce other components through the execution of an operation or process. An example is raw materials or information. The result of the acted on input by the process is the output.
- Process—a set of activities that use clearly identified input(s) to produce clearly identified output(s). A process flow is the full description of the elements that define the process activities. A process maybe completely described on a single diagram or complex enough that several layered diagrams will be required to represent it.
- Operation or execution scenario—is a logically related set of a process's activities that uses clearly identified input(s) to produce clearly identified output(s).
- Pattern—a shared set of relationships between an aggregation of elements. Elements can be anything in any combination—people, pieces of paper, food, character traits, behaviors, other patterns, relationships, or anything else we can identify.
- Noun or object—a noun is more than just a person, place, or thing. It may also be a concept, class, or category.
- Attribute—describes some feature or quality about an element. Concrete attributes are things like color, size, state, status and other “objective” statements. Induced attributes are in the eye of the beholder. Things like quality and a good place to work fall into that category.
- Verb—a kind of relationship between nouns or noun-like elements that involves action. VDL has a rich set of verbs and graphical ways to represent them. The symbol shown here is the Create verb.
- Integral to the process of delivering a strategic IT plan is the use of a methodology that ensures the work pattern is accurate and complete and adequately describes the approach that has been decided upon. The preferred method for depicting the work pattern workflow is VDL. The inherent discipline and structure that this method requires assures completeness of the process and supports reasonable and common graphical representations of the information that allow for communications of the results. This particular example of the workflow scenario assumes that the blueprint requires all of the strategic IT planning blueprint components to be developed during this project.
- FIGS.44A-44B depict the workflow scenario for delivering a strategic IT framework. The following is a brief description of the model. The first critical step defined in the workflow is to initiate the engagement or project by defining the approach, identifying participants including project team members, decision makers, and information sources, establishing the duration and key milestones, and establishing the scope and objectives. Interviews with key participants are then conducted with typically parallel efforts to gather existing documentation. This set of work or activities will lead to the next major steps, which are the development of the requisite business and technology models inclusive of current situation analysis and future direction understanding. The Tower reference models are fully documented and in this case are considered to be major deliverables with appropriate client participation and approvals for content. Key inputs to the development of the models are knowledge of emerging technologies, industry best practices, technology policy, and business trends. The project management process requires that project workbooks are created and interim milestones are met for periodic reviews and continuous feedback. Based on the drivers, gaps, and transition needs, a strategy to change the IT environment is defined. The participants assess this initial view of the Strategic IT Framework to assure business/IT alignment, estimate resources and feasibility, and determine staging and priorities of change initiatives. The result of this assessment is then presented to key decision makers which are typically IT Steering committees. The projects is then considered closed and should be viewed objectively to assess where it was successful and determine a process to maintain the plan and ensure its implementation.
- In order to articulate and graphically depict the particular reference models that will be used in support of delivering a strategic IT plan, the use of a technique called “story boarding” is used. The story board is built directly from the strategic IT plan blueprint, planning approach, and detailed work pattern. It has been found that the story board allows for a quick, clear, and concise understanding and communication of the model set that will be used to describe the enterprise both currently and in the future. At a high level the groupings of reference models will adhere to the Enterprise Strategic IT Planning Framework Tower and to the typical deliverables of a strategic IT plan as depicted in FIG. 45.
- Use of the story board will help the practitioners to precisely communicate the collection of reference models that will be used in the planning initiative and to understand at a glance the relationships of the framework components and the content of deliverables.
- Summary
- Creating an enterprise architecture approach in which to develop complex IT systems is a difficult task because opposing interests must be balanced. On the one hand, the approach can support IT development through standards, guidelines, management policies, approved products and methods. On the other hand, a system that completely adheres to a standard architecture may be inflexible to the point that it cannot be optimized for a particular task. Such is the tradeoff between standardization for manageability and customization for functionality. The essence of an architecture is structure, simplification, compromise, and balance. Consider that a system is a set of disparate elements crafted together to perform a unique function that cannot be performed by any single element on its own. The most important attribute of the system becomes the relationships that transforms the dissimilar elements into an organic whole. The architecture controls the complexity and uncertainty of the element relationships by establishing interfaces, form, fit and function. It makes the pieces fit and facilitates the integration and resolution of structural conflicts. The architecture defines the whole.
- The amount of information captured in the architecture is a delicate balance between too little detail (result: system chaos) and too much detail (result: stifled innovation). The goal is to have enough specificity to facilitate management of the IT environment while permitting application developers the opportunity to tailor designs to meet business demands or technology changes. Finally, it is important to note that an architecture is not simply defined at a single point in time and placed on a shelf as complete. Rather, an architecture is an evolving entity that changes with the business environment and the technology landscape. In fact, it's real benefit is the need for the IT organization to continually address the architecture's validity, stimulate discussion and gain consensus. An enterprise IT architecture and framework is a powerful tool that needs attentive care to realize the full power of its benefits.
- The Enterprise Strategic IT Planning Framework Tower is the starting point for determining the context and mandatory, major components and methods needed to develop a strategic IT plan and consequently build IT solutions for a successfully enabling an enterprise. The Tower will help IT personnel to effectively analyze and evaluate business and technology requirements, put them in their proper context, and ensure that due consideration has been given to all of the architectural components needed to support business needs and requirements. In addition the Tower will help achieve the goals of defining and embodying a value proposition and intellectual capital based on experience and success, ensuring consistency of delivery and integration of results, ensure specificity in definition but not in a prescriptive “cookbook” approach, and allowing tailoring to individual and unique client requirements but building from a foundation of “best practices”.
- The deliberate approach and modeling of a strategic planning process using the Enterprise Strategic IT Planning Framework Tower, blueprints, work pattern approaches, and graphical story boards will insure that the development of a strategic IT plan will be reasonable, executable, and useful. The strategic IT plan's implementation will provide the framework and process for defining the vision, mission and long term objectives for IT and aligning them with the business, the strategies for achieving them, and the architectures to enable them. The strategic IT plan's implementation provides the context and guidance that drives the definition of integrated business and IT systems (in support of business processes and functions), organization structure, and IT solution sets for products and services. The strategic IT plan also determines the actions and parameters for the allocation of resources to meet the objectives and allows for a deliberate, planned, and effective utilization of an enterprise's investment in time and resources.
- Thus, it is apparent that there has been provided, in accordance with the present invention, a structure for and a method of modeling integrated business and IT frameworks and architecture in support of a business that satisfies the advantages set forth above. Although the present invention has been described in detail, various changes, substitutions, and alterations may be readily ascertainable by those skilled in the art and may be made herein without departing from the spirit and scope of the present invention as defined by the following claims.
- Appendix1: Modeling Rules and Guidelines
- Rules:
- There are four types of enterprise models:
- Architectures—Graphically portray what are the purposes and interrelationships of all elements of an enterprise.
- Workflows—Graphically portray how inputs are transformed to outputs for the enterprise.
- Events—Graphically portray when the enterprise must react in a preplanned way.
- Function/Process—Organizes the processes of the enterprise into similar functional areas.
- Architecture, workflow, and event models are required that are balanced and leveled with inputs and outputs. The function/process model is optional. Typical modeling approaches create just the workflows and a few include the event models. The architecture models are missing, and usually the workflows are not balanced and leveled with the inputs and outputs. The architectures are required in order to bring the models to closure and some reasonable state of finality. The architectures enable the workflows initiated by the external events. It clearly defines relationships between all components of the enterprise through the inputs and outputs.
- Decomposition of the architecture and workflow models is required. Proper decomposition around outputs or results reduces the complexity of the enterprise into manageable and integrated elements. It also enables the possibility of outsourcing with well-defined requirements and business rules for each element. The enterprise decomposition evolves around an output or result, not an activity or function. Sawing it in pieces never decomposes an airplane. You do not want to fly a reassembled airplane that was sawed in pieces. The same holds true for a Value Stream.
- The use of a common language for modeling and decomposition is required. A more graphical and richer modeling language is preferred. Do not seek the “lowest common” denominator when considering modeling languages. A richer modeling language enables better communication through a more precise graphical representations of the model. It also forces the team members to listen and communicate better since each has to communicate through the modeling language. This learning actually enables better communication. Instead of listening to just words, each team member seeks to understand the ideas and concepts represented by the common language in the models.
- Modeling Guidelines:
- Architecture decomposition and transition to workflow—Continue to decompose an architecture model until each of its scenarios achieves some relative independence from the other scenarios. Then, cross check the independent scenarios to see if each is directly associated with an event external to the enterprise or Value Stream.
- Management of workflow instantiation—Enterprise models illustrate what, how, where, who and when. While these models represent the possible workflow variations they are not intended to represent the schedule of a single unique workflow instantiation or occurrence. Management of various occurrences of events is appropriately tracked with a schedule. However, these numerous schedules are not included in the domain of enterprise models.
- Model Definitions:
- Enterprise Models—defined as an ordered set of activities linked by predefined relationships, execution of which is triggered by some events(s) and which result in some observable or quantifiable end result. This integrated set of abstract models illustrate the following characteristics about the enterprise: what, how, when, who, how much and where. Enterprise models are the knowledge base and memory of the enterprise.
- Value Streams—An end to end array of activities that collectively integrates cross-functional processes across an enterprise and creates value (i.e. speed, quality, service and/or cost benefit) for both internal and external customers. The Value Streams reconcile all the views a customer may have of the enterprise and create the view of a single, serving enterprise dedicated to the customer. The Value Streams satisfy the customer wishes as fully as possible, rather than to focus on internal procedures (or functions) such as accounting or selling or shipping.
- Architecture Models—Models of Architecture: These illustrate the style and method of design and construction that comprises the elements of a system and defines the purpose and interrelationships of those elements.
- Workflow Models—These illustrate the sequence of activities necessary to transform the inputs into the required outputs.
- Event Models—These illustrate the things that happen outside the enterprise/Value Stream to which the enterprise/Value Stream must react in a preplanned way.
- Function/Process Models—Defined as a set of models illustrating the functional groupings of an enterprise. These are further subdivided into two groups, primary (e.g. Operations) and supporting (e.g. Finance). Each functional group contains several unique business processes (e.g. for Finance, Accounting and Asset Management).
- Appendix2: Visual Design Language Summary
- The following section identifies the notations that are used in VDL modeling diagrams. VDL was authored by Neal Goldstein, who is a consultant on business process design, software development methodologies, and object technology. His emphasis is on innovating business processes, and the appropriate use of technology in implementing the processes. He has been Director of Management Information Systems for a
Fortune 500 corporation and the primary architect of a number of systems that have implemented redesigned business processes. He can be reached at - Neal Goldstein
-
- Palo Alto, Calif.94301
- 415-327-9525 Fax
- neal@nealgoldstein.com
- Copyright ® 1994, 1995, 1996, 1997, 1998, 1999 by Neal Goldstein. All rights reserved.
- FIGS.46A-46K show the symbols used for noun and noun-like notations used in VDL modeling diagrams. FIGS. 47A-47J show the symbols used for verb notations used in VDL modeling diagrams. FIGS. 48A-48G show the symbols used for modifier notations used in VDL modeling diagrams. FIGS. 49A-49H show the symbols used for preposition notations used in VDL modeling diagrams. FIGS. 50A-50F show the symbols used for conjunction notations used in VDL modeling diagrams.
- Nouns
- A noun corresponds to the noun in English. Nouns may act (be a subject) or be acted upon (object). And just as in English, a noun is more than just a person, place, or thing. It may also be a concept, class, or category. What makes an element a noun is what makes a word a noun in English, how it is used. In our case, a noun is something that can appear on one or the other side of a noun verb noun phrase.
- Noun or Object (FIG. 46A)
- Nouns are also referred to as objects. A solid disk represents a noun.
- Noun-Likes
- Noun-like elements are not strictly nouns, but can act like them, i.e. they can act as a subject or object.
- Frame (FIG. 46B)
- The Frame is the scope of the explanation. It can be an extended enterprise, enterprise department, system, etc. A Frame is represented by a rectangle with two right angle lines in the top left corner.
- Pattern (FIG. 46C)
- A pattern is a shared set of relationships between an aggregation of elements. Elements can be anything in any combination—people, pieces of paper, food, character traits, behaviors, other patterns, relationships, or anything else we can identify. Patterns can be used to represent an abstraction, class, category, or any cognitive set of properties such as a “vehicle” or the similarities between version of a process. A pattern is a shortcut that avoids the need to separately describe each element. A “bowl” shape represents a pattern.
- Process (FIG. 46D)
- A process is set of activities that use clearly identified input(s) to produce clearly identified output(s). A process takes time and almost always crosses functional boundaries in most (functional) organizations. A process may be value added, support, or non-value added. An hourglass represents a process.
- Sub Process (FIG. 46E)
- A Sub process summarizes all activities in a functional area, such as accounting or operations. Placing an “S” in the process symbol identifies a sub process.
- Operation (Execution Scenario) (FIG. 46F)
- An operation or execution scenario is a logically related set of a process's activities that uses clearly identified input(s) to produce clearly identified output(s). It can be decomposed to describe the components, behaviors, and their first order relationships that result in an operation's output. An operation should be a gestalt, a whole that is taken by the viewer as being more than just the sum of its parts. A file folder represents an operation. At times it is useful to organize activities hierarchically so that a single operation as a whole is represented as a single element in a larger operation. In this case the operation element can represent a sub operation.
- Procedure (FIG. 46G)
- A procedure scenario is an activity that is measured by result and behavior. Associated with a procedure scenario is a high level set of instructions to perform the activity.
- Content Rule (FIG. 46H)
- A scenario performed by a computer may have several content rules for performing computer operations associated with it.
- Interface Rule (FIG. 46I)
- A scenario performed by a person using a computer may have several specifications for the interface or several interface rules associated with it.
- Content Elements
- The content rules contain additional elements. These include content objects and abstractions. These are directly analogous to, respectively, nouns and patterns. We use hard angles with content elements to identify them as technological creations used by a computer rather than the real world or concepts.
- Content Object (FIG. 46J)
- A content object is a technological creation, usually inside of a computer. A parallelogram-type solid represents a content object.
- Content Abstraction (FIG. 46K)
- A content abstraction is an assertion that certain content objects share the attributes and responsibilities listed for the abstraction. A content abstraction is a shortcut that avoids the need to separately describe each content object. A shallow box represents a content abstraction.
- Verbs
- A verb is a kind of relationship between nouns or noun-like elements that involves action. Some verbs require that the noun on one or both ends of the relationship be active, i.e. able to behave. The requirement for a active noun, or one that is capable of behaving is represented in the Language Reference by an “A” inside of a circle. Things like people, computers, and machines are active, while things like information, rocks, and business reports are not. A noun-like element that is an abstraction of an active noun, or whose decomposition contains an active noun, also meets this requirement. Depending on the level of detail desired, verb symbols can either be drawn from a noun or from a specific activity.
- Create (FIG. 47A)
- An active noun can create nouns and other elements. Create is represented by a line with a plus sign (+) on the end toward the element being create.
- Create (FIG. 47B)
- An active noun can destroy nouns and other elements. Destroy is represented by a line with a minus sign () on the end toward the element being destroyed.
- Manipulate (FIG. 47C)
- An active noun can manipulate nouns and other elements. Manipulation encompasses change, modification and physical movement. Manipulate is represented by a line with an arc on the end toward the element being manipulated noun.
- Use as Information (FIG. 47D)
- An active noun can use (usually non-active) nouns as information. As we said, what makes something information is that it answers a question. Use as information is represented by a line with a reverse arrow on the end toward the object that contains the information.
- Use as Input (FIG. 47E)
- Active nouns can use (usually non-active) nouns as input. This is most commonly used to represent things like raw materials used in an activity or process. Use as input is represented by an arrow with the arrow head on the end toward the object that uses the input. You may also distinguish between information, which answers questions, and data, which serves as input, by treating data as input.
- Use as a Rule (FIG. 47F)
- An active noun can use (usually non-active) nouns as a rule or constraints placed upon a process or action. Use as a rule is represented by a line with a double reverse arrow on the end toward the object that contains the rule.
- Collaborating (FIG. 47G)
- Two active nouns can be collaborating. Collaborating is a two-way interaction. A double-headed arrow passing through a conduit represents collaborating. Since to be able to send information (or commands) from one noun another, there must be an activity for the sender that sends the message and one for the receiver that receives and acts on the message, collaboration is more commonly shown between activities.
- Command (FIG. 47H)
- An active noun can command active nouns. Command is a one way interaction. Command is represented by an arrow passing through a conduit, with the arrowhead on the end toward the object that receives (and performs) the command.
- Cause (FIG. 47I)
- An element can cause something to happen. Cause is different from create in that it is indirect. I don't make a customer unhappy—an action on my part causes a customer to become unhappy. This relationship can exist between any two elements. A dashed line going through a conduit with an arrow on the end toward the element being caused represents cause.
- Cause to Change, Affect (FIG. 47J)
- An element can cause something to change. Cause to change is different from manipulate in that it is indirect. Cause to change is represented by a dashed line with an arc on the end toward the changed element.
- Modifiers
- Attribute (FIG. 48A)
- An attribute describes some feature or quality about an element. An attribute is represented by a flat oblong disk, slightly above the plane and connected to the element. Attributes can be concrete or induced. Concrete attributes are things like color, size, state, status and other “objective” statements. Induced attributes are in the eye of the beholder. Things like quality and a good place to work fall into that category. Induced attributes are based upon some mental model of what that attribute means. A dash of quality cannot be added to a product during quality assurance, it becomes an attribute when a certain set of conditions are true.
- Absence of (FIG. 48B)
- The absence of an element may cause a problem and we may want to indicate that something is not there. Absence of is represented by a slash through the missing element. Absence of is used extensively in Contexts to illustrate casualty and especially useful to call attention to missing relationships.
- Activities
- Active nouns may have explicit activities specified. An activity is a specific action, with a result that can be measured and/or evaluated. Activities can be either responsibilities or procedures.
- Responsibility (FIG. 48C)
- A responsibility is an activity that is measured by results rather than behavior. A responsibility is represented by text over a line, slightly above the plane and connected to the element.
- Procedure (FIG. 48D)
- A procedure is an activity that is measured by result and behavior. Associated with a procedure is a step-by-step set of instructions to perform the activity. A procedure is represented by text over a line, over a document icon, slightly above the plane and connected to the element.
- Sub Operation (FIG. 48E)
- At times it is useful to organize activities hierarchically so that a single operation as a whole is represented as a single element in a larger operation. As was shown previously, a sub operation can be represented by an operation within an operation. Alternatively, a sub operation is represented by text over a line, over an operation icon, slightly above the plane and connected to the element.
- Activity with Content Rule (FIG. 48F)
- An activity performed by a computer may have a business or content rule for performing a computer operation associated with it. A content rule is represented by text over a line, over a computer icon, slightly above the plane and connected to the element.
- Activity with Interface Rule (FIG. 48G)
- An activity performed by a person using a computer may have specifications for the interface or an interface rule associated with it. To indicate this, a monitor icon is placed under the activity's text line.
- Prepositions
- Propositions show the relationship between elements.
- Aligned (FIG. 49A)
- Two elements can be aligned. Elements are aligned when both have the same goals. Aligned is represented by a dashed line passing through a conduit.
- Consistent (FIG. 49B)
- Two elements can be consistent. Elements are consistent when they are compatible or synchronized at the operation level. A line passing through a conduit represents Consistent.
- Same (FIG. 49C)
- Two elements can be the same. The same element may have different names, for clarity or by necessity.
- Implemented by, Partially Implemented by (FIG. 49D)
- An element may be implement by, or partially implemented by another element. Implemented by is used to indicate satisfaction of some requirement and is usually a relationship between things of different types. Implemented by is represented by a line with a double headed arrow from the element being implemented to its implementation, with the arrow heads on the end towards the element that is the implementation. Partially implemented by is represented by a dotted line with a double headed dotted arrow from the element being implemented to its partial implementation, with the arrow heads on the end towards the element that is the partial implementation.
- Replaced by, Partially Replaced by (FIG. 49E)
- One element may be replaced by or partially replaced replaced by another. This may occur when something becomes obsolete. Replaced by is represented by a line with an “x” on the end toward the element being replaced. Partially replaced by is represented by a dotted line with an “x” on the end toward the element being replaced.
- Part of (FIG. 49F)
- A noun can be part of another noun that is a grouping of objects that combine to make up a whole. Part of is represented by an arrow with right-angle lines coming from the top of the part into the bottom of the whole, with the arrow-head on the end toward the whole.
- Contained in (FIG. 49G)
- A noun can be contained in another noun. Contained in is represented by a curved arrow from the element contained, into the top of the element containing it, with the arrowhead on the end toward the container.
- Kind of, Type of (FIG. 49H)
- An element can be a kind of or type of another element. This is the case when they share properties. This relationship can exist between any two elements, and not just an element and a pattern, which we indicated can be used to define what the shared properties are. In the former case, all you may want to show is that one element is a type of another element, without describing their shared properties. A curved arrow with right-angle lines represents type of, coming from the element that is the type of, with the arrow head on the end toward the element that is that type.
- Conjunctions
- A conjunction is used to join elements.
- Time
- Depending on the context, Western culture interprets left to right and top to bottom as a time sequence. We use that automatic interpretation to describe the time sequence of activities in Execution Scenarios.
- Time Line (FIG. 50A)
- It may be useful to explicitly represent a time line. A time line can show that time has passed. An object's activities can also be placed along a time line at the point in time at which they execute. A time line is represented by a alternating short and long dashes. A time line is necessary to show time in a Context.
- Delay (FIG. 50B)
- There may be a delay in a time line. A delay is represented by two 45 degree lines indicating the start and end of the delay. An attribute may be used to explain the delay or conditions for restart.
- Repeat (FIG. 50C)
- A set of activities may repeat. Two vertical lines indicating the start and end of the segment that repeats represent Repeat. An attribute may be attached to the right vertical line to indicate the conditions that causes the repetition to stop. Repeats may be nested.
- Selection from Alternatives
- Often things are not fixed. There may be the from possibility of alternatives—paths in a time sequence or element relationships, attributes, parts, and the like.
- One or More (FIG. 50D)
- One or more of the elements may exist. One or more is represented by a line with a number of branches corresponding to the number of alternatives. None may be a choice and must be explicitly indicated. This can be used to indicate such things as the possibility of one or more paths in a time sequence or one or more relationships, one or more attributes, one or more things contained, one or more parts, and the like.
- Only One (FIG. 50E)
- Only one of the alternatives may exist. Only one is represented by a line with a vertical line through number of branches corresponding to the number of alternatives.
- Any Order (FIG. 50F)
- Sometimes activities may be performed in any order. Braces represent any order.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/744,347 US20040143470A1 (en) | 1999-08-20 | 2003-12-22 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/378,514 US7162427B1 (en) | 1999-08-20 | 1999-08-20 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
US10/744,347 US20040143470A1 (en) | 1999-08-20 | 2003-12-22 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/378,514 Continuation US7162427B1 (en) | 1999-08-20 | 1999-08-20 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040143470A1 true US20040143470A1 (en) | 2004-07-22 |
Family
ID=23493413
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/378,514 Expired - Fee Related US7162427B1 (en) | 1999-08-20 | 1999-08-20 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
US10/606,661 Expired - Fee Related US7870004B2 (en) | 1999-08-20 | 2003-06-25 | Method of modeling frameworks and architecture in support of a business |
US10/744,347 Abandoned US20040143470A1 (en) | 1999-08-20 | 2003-12-22 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/378,514 Expired - Fee Related US7162427B1 (en) | 1999-08-20 | 1999-08-20 | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business |
US10/606,661 Expired - Fee Related US7870004B2 (en) | 1999-08-20 | 2003-06-25 | Method of modeling frameworks and architecture in support of a business |
Country Status (12)
Country | Link |
---|---|
US (3) | US7162427B1 (en) |
EP (1) | EP1221109A2 (en) |
JP (1) | JP2003524825A (en) |
KR (1) | KR20020026587A (en) |
CN (1) | CN1399754A (en) |
AU (1) | AU767667B2 (en) |
BR (1) | BR0013457A (en) |
CA (1) | CA2384791A1 (en) |
HK (1) | HK1046971A1 (en) |
MX (1) | MXPA02001823A (en) |
NZ (1) | NZ517283A (en) |
WO (1) | WO2001014998A2 (en) |
Cited By (168)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020035500A1 (en) * | 2000-06-05 | 2002-03-21 | Shinji Yoko | Multi-dimensional management method and system |
US20020138358A1 (en) * | 2001-01-22 | 2002-09-26 | Scheer Robert H. | Method for selecting a fulfillment plan for moving an item within an integrated supply chain |
US20020142273A1 (en) * | 2001-03-30 | 2002-10-03 | Dollins James T. | Interactive process learning aid |
US20020152088A1 (en) * | 2001-04-11 | 2002-10-17 | Thomas Hogan | Method for automatically developing a strategic agribusiness plan |
US20020178159A1 (en) * | 2001-02-06 | 2002-11-28 | O'brien Christopher | Data mining system, method and apparatus for industrial applications |
US20020198751A1 (en) * | 2001-06-22 | 2002-12-26 | International Business Machines Corporation | Method for improving information technology infrastructure |
US20030018505A1 (en) * | 2001-07-12 | 2003-01-23 | Seagate Technology Llc | Model for a strategic technology alliance |
US20030018490A1 (en) * | 2001-07-06 | 2003-01-23 | Marathon Ashland Petroleum L.L.C. | Object oriented system and method for planning and implementing supply-chains |
US20030028416A1 (en) * | 2001-07-12 | 2003-02-06 | Seagate Technology Llc | Evaluation to technological stragtegies |
US20030065641A1 (en) * | 2001-10-01 | 2003-04-03 | Chaloux Robert D. | Systems and methods for acquiring information associated with an organization having a plurality of units |
US20030088447A1 (en) * | 2001-11-02 | 2003-05-08 | Desbiens Marc A. | Computer-based business planning processes |
US20030093310A1 (en) * | 2001-11-09 | 2003-05-15 | Macrae David G. | Business management process |
US20030182651A1 (en) * | 2002-03-21 | 2003-09-25 | Mark Secrist | Method of integrating software components into an integrated solution |
US20040006505A1 (en) * | 2002-04-18 | 2004-01-08 | Cereseto Reinaldo M. | Strategic and visionary selling of information technology solutions |
US20040064349A1 (en) * | 2002-09-30 | 2004-04-01 | Humenansky Brian S. | Deploying multiple enterprise planning models across clusters of application servers |
WO2004031894A2 (en) * | 2002-09-30 | 2004-04-15 | Adaytum, Inc. | Selective deployment of software extensions within an enterprise modeling environment |
US20040133445A1 (en) * | 2002-10-29 | 2004-07-08 | Marathon Ashland Petroleum L.L.C. | Generic framework for applying object-oriented models to multi-tiered enterprise applications |
US20040138942A1 (en) * | 2002-09-30 | 2004-07-15 | Pearson George Duncan | Node-level modification during execution of an enterprise planning model |
US20040143504A1 (en) * | 2002-12-25 | 2004-07-22 | Ming-Fang Tsai | Purchase order management system and related methods |
US20040162744A1 (en) * | 2003-02-19 | 2004-08-19 | Adam Thier | Cascaded planning of an enterprise planning model |
US20040172272A1 (en) * | 2001-06-20 | 2004-09-02 | Shillinglaw Carol L. | Method and system for dynamically analyzing consumer feedback to determine project performance |
US20040181446A1 (en) * | 2003-03-13 | 2004-09-16 | Vance Michael E. | Method, system and apparatus for managing workflow in a workplace |
US20040236738A1 (en) * | 2002-09-30 | 2004-11-25 | Adaytum, Inc. | Real-time aggregation of data within an enterprise planning environment |
US20050049904A1 (en) * | 2003-08-25 | 2005-03-03 | Von Biedermann Almut D. | Process for business quality control |
US20050171797A1 (en) * | 2004-02-04 | 2005-08-04 | Alcatel | Intelligent access control and warning system for operations management personnel |
US20050203913A1 (en) * | 2004-03-15 | 2005-09-15 | Ramco Systems Limited | Software life cycle availability over the internet |
US20050203865A1 (en) * | 2004-03-15 | 2005-09-15 | Ramco Systems Limited | Structured approach to software specification |
US20050234766A1 (en) * | 2004-04-14 | 2005-10-20 | Shuker Thomas J | Method of improving administrative functions of a business using valve streams |
US20050283400A1 (en) * | 2004-05-13 | 2005-12-22 | Ivo Nelson | System and method for delivering consulting services and information technology solutions in a healthcare environment |
US20050289655A1 (en) * | 2004-06-28 | 2005-12-29 | Tidwell Justin O | Methods and systems for encrypting, transmitting, and storing electronic information and files |
US20060015805A1 (en) * | 2004-07-16 | 2006-01-19 | Humenansky Brian S | Spreadsheet user-interface for an enterprise planning system having multi-dimensional data store |
US20060023738A1 (en) * | 2004-06-28 | 2006-02-02 | Sanda Frank S | Application specific connection module |
US20060026268A1 (en) * | 2004-06-28 | 2006-02-02 | Sanda Frank S | Systems and methods for enhancing and optimizing a user's experience on an electronic device |
US20060036479A1 (en) * | 2004-08-13 | 2006-02-16 | International Business Machines Corporation | System and method for designing secure solutions using patterns |
US20060053149A1 (en) * | 2004-09-08 | 2006-03-09 | Atsushi Iwasaki | Method and system for supporting development of information systems based on EA |
US20060080327A1 (en) * | 2004-10-07 | 2006-04-13 | Gramling Norman W | Systems and methods for information management involving taxonomy and lifespan planning |
US20060080157A1 (en) * | 2004-10-12 | 2006-04-13 | Shuker Thomas J | Method of improving administrative functions of a business using value streams with display of status |
US20060080156A1 (en) * | 2004-10-08 | 2006-04-13 | Accenture Global Services Gmbh | Outsourcing command center |
US20060080159A1 (en) * | 2004-10-08 | 2006-04-13 | Sampath Kumar | Method, program and system for the implementation of cognitive business processes in a sales enterprise |
US20060085237A1 (en) * | 2004-09-20 | 2006-04-20 | Shuker Thomas J | Method of improving information technology processes of a business using value stream management |
US20060085205A1 (en) * | 2004-10-08 | 2006-04-20 | Sampath Kumar | Method, program and system for the implementation of cognitive business processes |
US20060089943A1 (en) * | 2004-10-25 | 2006-04-27 | Perot Systems Corporation | Computer system and process for aiding in an outsourcing environment |
US20060143219A1 (en) * | 2004-12-29 | 2006-06-29 | Smith Laurence T | Business change lifecycle framework |
US20060156054A1 (en) * | 2005-01-07 | 2006-07-13 | Lantronix, Inc. | Milarrs systems and methods |
US20060155596A1 (en) * | 2000-05-22 | 2006-07-13 | Cognos Incorporated | Revenue forecasting and sales force management using statistical analysis |
US20060155564A1 (en) * | 2005-01-11 | 2006-07-13 | International Business Machines Corporation | Method and system for automatically creating and maintaining business systems using relationships |
US20060229922A1 (en) * | 2005-03-31 | 2006-10-12 | Microsoft Corporation | Association and visualization of schematized business networks |
US7130822B1 (en) | 2000-07-31 | 2006-10-31 | Cognos Incorporated | Budget planning |
US20060277156A1 (en) * | 2005-06-02 | 2006-12-07 | Yasmin Merican | Apparatus and method for integrating enterprise market planning processes and information systems (EMP) with enterprise resource planning processes and information systems (ERP) in emerging brand companies |
US20070021992A1 (en) * | 2005-07-19 | 2007-01-25 | Srinivas Konakalla | Method and system for generating a business intelligence system based on individual life cycles within a business process |
US20070027701A1 (en) * | 2005-07-15 | 2007-02-01 | Cohn David L | System and method for using a component business model to organize an enterprise |
US20070038648A1 (en) * | 2005-08-11 | 2007-02-15 | International Business Machines Corporation | Transforming a legacy IT infrastructure into an on-demand operating environment |
US20070038627A1 (en) * | 2005-08-12 | 2007-02-15 | Cohn David L | System and method for using a component business model to manage an enterprise |
US20070043724A1 (en) * | 2005-08-22 | 2007-02-22 | Infosys Technologies Ltd | Systems and methods for integrating business processes |
US20070050232A1 (en) * | 2005-08-26 | 2007-03-01 | Hung-Yang Chang | Method and system for enterprise monitoring based on a component business model |
US20070055564A1 (en) * | 2003-06-20 | 2007-03-08 | Fourman Clive M | System for facilitating management and organisational development processes |
US20070112945A1 (en) * | 2005-11-12 | 2007-05-17 | Lori Brown | Supply and demand project management tool |
US20070143159A1 (en) * | 2005-12-16 | 2007-06-21 | Dillard Robin A R | System and method for outcomes-based delivery of services |
US20070168914A1 (en) * | 2005-11-08 | 2007-07-19 | International Business Machines Corporation | Aligning Information Technology with Business Objectives Through Automated Feedback Control |
US7257612B2 (en) | 2002-09-30 | 2007-08-14 | Cognos Incorporated | Inline compression of a network communication within an enterprise planning environment |
US20070203766A1 (en) * | 2006-02-27 | 2007-08-30 | International Business Machines Corporation | Process framework and planning tools for aligning strategic capability for business transformation |
US20070208605A1 (en) * | 2001-03-30 | 2007-09-06 | Jesse Ambrose | System and method for using business services |
US20070226031A1 (en) * | 2004-11-30 | 2007-09-27 | Manson Nicholas R | Methods and apparatuses for grouped option specification |
US20070239717A1 (en) * | 2005-09-01 | 2007-10-11 | International Business Machines Corporation | System and method for architecting pattern based models within a governmental framework |
US20070239467A1 (en) * | 2004-11-30 | 2007-10-11 | Bezeau Jonathan R | Methods and apparatuses for providing provisioned access control for hosted tailored vertical applications |
US20070250373A1 (en) * | 2006-04-21 | 2007-10-25 | International Business Machines Corporation | Method, system, and program product for generating an integrated view |
US20070288275A1 (en) * | 2006-06-13 | 2007-12-13 | Microsoft Corporation | It services architecture planning and management |
US7343294B1 (en) * | 2001-01-05 | 2008-03-11 | Fair Isaac Corporation | Multi-channel marketing database development methodology |
US20080066067A1 (en) * | 2006-09-07 | 2008-03-13 | Cognos Incorporated | Enterprise performance management software system having action-based data capture |
US7346533B1 (en) * | 2001-10-24 | 2008-03-18 | Perot Systems Corporation | Method and system for utilizing best practices to satisfy requirements of a requirements specification |
US20080120126A1 (en) * | 2006-11-21 | 2008-05-22 | George Bone | Intelligent parallel processing system and method |
US20080162155A1 (en) * | 2006-12-29 | 2008-07-03 | Gregory John Small | Methods and apparatus providing an e-enabled ground architecture |
US20080162204A1 (en) * | 2006-12-28 | 2008-07-03 | Kaiser John J | Tracking and management of logistical processes |
US20080215399A1 (en) * | 2004-11-23 | 2008-09-04 | Kaan Kudsi Katircioglu | Method for Business Process Mapping, Design, Analysis and Performance Monitoring |
US20080228535A1 (en) * | 2007-03-13 | 2008-09-18 | Kevin Hanes | Information Handling System Deployment Assessment |
US20080228506A1 (en) * | 2007-03-13 | 2008-09-18 | Stephen Oates | Optimized Deployment Solution |
US20080228505A1 (en) * | 2007-03-13 | 2008-09-18 | Kevin Hanes | Client Deployment Optimization Model |
US20080228814A1 (en) * | 2007-03-13 | 2008-09-18 | Jefferson Raley | Determining Software Rationalization for Optimizing Information Handling System Deployments |
US20080255912A1 (en) * | 2007-04-12 | 2008-10-16 | Electronic Data Systems Corporation | Framework System and Method for Determining Deliverables Required to Implement a Technology-Enabled Business Change |
US20080270156A1 (en) * | 2007-04-27 | 2008-10-30 | Tony Harrell | System and method for information technology service strategy |
US20080270973A1 (en) * | 2007-04-30 | 2008-10-30 | Nigel Edwards | Deriving grounded model of business process suitable for automatic deployment |
US20080288305A1 (en) * | 2007-05-15 | 2008-11-20 | Laluzerne Joseph D | Enterprise Decision Management System and Method |
US20090006147A1 (en) * | 2007-06-27 | 2009-01-01 | Harirajan Padmanabhan | Method and system for defining and managing information technology projects based on conceptual models |
US20090012800A1 (en) * | 2007-07-06 | 2009-01-08 | International Business Machines Corporation | Computer-assisted information technology service design system |
US20090037241A1 (en) * | 2007-07-31 | 2009-02-05 | M3 Planning, Inc. | Automated strategic planning system and method |
US20090037870A1 (en) * | 2007-07-31 | 2009-02-05 | Lucinio Santos-Gomez | Capturing realflows and practiced processes in an IT governance system |
US20090089121A1 (en) * | 2007-09-27 | 2009-04-02 | Siemens Aktiengesellschaft | Method and system for controlling a project |
US20090125409A1 (en) * | 2007-11-08 | 2009-05-14 | Wholesale Carrier Services, Inc. | End-to-end management of carrier services for enterprises and resellers |
US20090172688A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing execution within a computing environment |
US20090172670A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Dynamic generation of processes in computing environments |
US20090172682A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Serialization in computer management |
US20090171706A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Computer pattern system environment supporting business resiliency |
US20090171730A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Non-disruptively changing scope of computer business applications based on detected changes in topology |
US20090172674A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing the computer collection of information in an information technology environment |
US20090172769A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Programmatic validation in an information technology environment |
US20090171707A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Recovery segments for computer business applications |
US20090172461A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Conditional actions based on runtime conditions of a computer system environment |
US20090171731A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Use of graphs in managing computing environments |
US20090172671A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Adaptive computer sequencing of actions |
US20090172460A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Defining a computer recovery process that matches the scope of outage |
US20090172689A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Adaptive business resiliency computer system for information technology environments |
US20090187413A1 (en) * | 2008-01-18 | 2009-07-23 | Timothy Abels | Service delivery platform for automated and remote information technology management |
US20090288018A1 (en) * | 2008-02-01 | 2009-11-19 | Infosys Technologies Limited | Framework for supporting transition of one or more applications of an organization |
US20090299912A1 (en) * | 2008-05-30 | 2009-12-03 | Strategyn, Inc. | Commercial investment analysis |
US20090328010A1 (en) * | 2008-06-30 | 2009-12-31 | International Business Machines Corporation | System and method for platform-independent, script-based application generation for spreadsheet software |
US20100030598A1 (en) * | 2008-08-01 | 2010-02-04 | Electronic Data Systems Corporation | Platform provisioning system and method |
US20100036699A1 (en) * | 2008-08-06 | 2010-02-11 | Microsoft Corporation | Structured implementation of business adaptability changes |
US20100057508A1 (en) * | 2008-09-02 | 2010-03-04 | Microsoft Corporation | Structured implementation of business functionality changes |
US20100063871A1 (en) * | 2008-09-08 | 2010-03-11 | Microsoft Corporation | Linking service level expectations to performing entities |
US20100082380A1 (en) * | 2008-09-30 | 2010-04-01 | Microsoft Corporation | Modeling and measuring value added networks |
US20100082691A1 (en) * | 2008-09-19 | 2010-04-01 | Strategyn, Inc. | Universal customer based information and ontology platform for business information and innovation management |
US20100082407A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for financial transformation |
US20100082386A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for finding business transformation opportunities by analyzing series of heat maps by dimension |
US20100082696A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for inferring and visualizing correlations of different business aspects for business transformation |
US20100082387A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for finding business transformation opportunities by using a multi-dimensional shortfall analysis of an enterprise |
US20100082381A1 (en) * | 2008-09-30 | 2010-04-01 | Microsoft Corporation | Linking organizational strategies to performing capabilities |
US20100082385A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for determining temperature of business components for finding business transformation opportunities |
US20100115490A1 (en) * | 2008-10-30 | 2010-05-06 | Hewlett-Packard Development Company, L.P. | Automated Lifecycle Management of a Computer Implemented Service |
US20100114618A1 (en) * | 2008-10-30 | 2010-05-06 | Hewlett-Packard Development Company, L.P. | Management of Variants of Model of Service |
US20100153183A1 (en) * | 1996-09-20 | 2010-06-17 | Strategyn, Inc. | Product design |
US20100161360A1 (en) * | 2008-12-22 | 2010-06-24 | Wachovia Corporation | Strategic planning management |
US7756901B2 (en) | 2003-02-19 | 2010-07-13 | International Business Machines Corporation | Horizontal enterprise planning in accordance with an enterprise planning model |
US20100262558A1 (en) * | 2007-12-20 | 2010-10-14 | Nigel Edwards | Incorporating Development Tools In System For Deploying Computer Based Process On Shared Infrastructure |
US20100280863A1 (en) * | 2007-12-20 | 2010-11-04 | Lawrence Wilcock | Automated Model Generation For Computer Based Business Process |
US20100293023A1 (en) * | 2009-05-12 | 2010-11-18 | Infosys Technologies, Ltd. | Framework for developing enterprise service architecture |
US7841011B2 (en) | 2004-11-30 | 2010-11-23 | Siebel Systems, Inc. | Methods and apparatuses for tiered option specification |
US20110004564A1 (en) * | 2007-12-20 | 2011-01-06 | Jerome Rolia | Model Based Deployment Of Computer Based Business Process On Dedicated Hardware |
US20110004565A1 (en) * | 2007-12-20 | 2011-01-06 | Bryan Stephenson | Modelling Computer Based Business Process For Customisation And Delivery |
US20110066466A1 (en) * | 2008-02-01 | 2011-03-17 | Infosys Technologies Limited | Method and system for generating transition plans for applications of organizations |
US20110093853A1 (en) * | 2007-12-28 | 2011-04-21 | International Business Machines Corporation | Real-time information technology environments |
US7958161B2 (en) | 2004-11-30 | 2011-06-07 | Siebel Systems, Inc. | Methods and apparatuses for providing hosted tailored vertical applications |
US20110137819A1 (en) * | 2009-12-04 | 2011-06-09 | International Business Machines Corporation | Tool for creating an industry business architecture model |
US20110137714A1 (en) * | 2009-12-03 | 2011-06-09 | International Business Machines Corporation | System for managing business performance using industry business architecture models |
US20110137622A1 (en) * | 2009-12-07 | 2011-06-09 | International Business Machines Corporation | Assessing the maturity of an industry architecture model |
US20110145230A1 (en) * | 2009-05-18 | 2011-06-16 | Strategyn, Inc. | Needs-based mapping and processing engine |
US8010397B1 (en) * | 2007-01-23 | 2011-08-30 | Sprint Communications Company L.P. | Enterprise infrastructure development systems and methods |
US20110218837A1 (en) * | 2010-03-03 | 2011-09-08 | Strategyn, Inc. | Facilitating growth investment decisions |
US20110246376A1 (en) * | 2010-03-31 | 2011-10-06 | International Business Machines Corporation | Cost benefit based analysis system for network environments |
US20110296021A1 (en) * | 2010-05-28 | 2011-12-01 | International Business Machines Corporation | Enabling Service Virtualization in a Cloud |
US20120059680A1 (en) * | 2010-09-02 | 2012-03-08 | Cox Communications, Inc. | Systems and Methods for Facilitating Information Technology Assessments |
US20120124104A1 (en) * | 2009-12-03 | 2012-05-17 | International Business Machines Corporation | Publishing an industry business architecture model |
US8244763B1 (en) * | 2008-12-18 | 2012-08-14 | The Pnc Financial Services Group, Inc. | Wiki-facilitated enterprise architecture repository |
US20120303409A1 (en) * | 2011-05-26 | 2012-11-29 | Bank Of America Corporation | Enterprise Opportunity Assessment |
US8341218B2 (en) | 2001-08-21 | 2012-12-25 | Rockstar Consortium Us Lp | Technique for enabling a plurality of software components to communicate in a software component matrix environment |
US8346931B2 (en) | 2007-12-28 | 2013-01-01 | International Business Machines Corporation | Conditional computer runtime control of an information technology environment based on pairing constructs |
US8347218B1 (en) | 2009-09-09 | 2013-01-01 | The Pnc Financial Services Group, Inc. | Enterprise architecture diagramming systems and methods |
US8375244B2 (en) | 2007-12-28 | 2013-02-12 | International Business Machines Corporation | Managing processing of a computing environment during failures of the environment |
US8655711B2 (en) | 2008-11-25 | 2014-02-18 | Microsoft Corporation | Linking enterprise resource planning data to business capabilities |
US8677174B2 (en) | 2007-12-28 | 2014-03-18 | International Business Machines Corporation | Management of runtime events in a computer environment using a containment region |
US8682705B2 (en) | 2007-12-28 | 2014-03-25 | International Business Machines Corporation | Information technology management based on computer dynamically adjusted discrete phases of event correlation |
US8751283B2 (en) | 2007-12-28 | 2014-06-10 | International Business Machines Corporation | Defining and using templates in configuring information technology environments |
US20140172510A1 (en) * | 2012-12-18 | 2014-06-19 | Hyland Software, Inc. | Enterprise Content Management (ECM) Solutions Tool and Method |
US8868441B2 (en) | 2007-12-28 | 2014-10-21 | International Business Machines Corporation | Non-disruptively changing a computing environment |
US20150026219A1 (en) * | 2012-07-23 | 2015-01-22 | Raanan Manor | System and method for enriching data and supporting data analysis in a hybrid environment |
US9069733B1 (en) | 2009-09-09 | 2015-06-30 | The Pnc Financial Services Group, Inc. | Enterprise architecture diagramming systems and methods |
US20150286670A1 (en) * | 2010-05-05 | 2015-10-08 | J.E. Dunn Construction Group, Inc. | System and method for managing facility content and equipment information |
US20160224915A1 (en) * | 2013-07-15 | 2016-08-04 | Hcl Technologies Ltd. | Alt asm |
US9558459B2 (en) | 2007-12-28 | 2017-01-31 | International Business Machines Corporation | Dynamic selection of actions in an information technology environment |
US9836337B1 (en) * | 2013-09-13 | 2017-12-05 | Stott Creations LLC | Enterprise service bus business activity monitoring system and related methods |
US9842012B1 (en) * | 2013-09-13 | 2017-12-12 | Stott Creations LLC | Business rule engine message processing system and related methods |
US9940182B1 (en) * | 2013-09-13 | 2018-04-10 | Stott Creations LLC | Business rule engine validation systems and related methods |
US10049335B1 (en) | 2009-10-06 | 2018-08-14 | EMC IP Holding Company LLC | Infrastructure correlation engine and related methods |
US10382275B1 (en) | 2012-10-22 | 2019-08-13 | Amazon Technologies, Inc. | Automated infrastructure configuration |
US10911592B2 (en) * | 2013-09-21 | 2021-02-02 | Oracle International Corporation | Method and system for defining an offlinable model graph |
US11030651B2 (en) * | 2016-05-06 | 2021-06-08 | Adp, Llc | Segmented user profiles |
US11107295B2 (en) * | 2019-08-26 | 2021-08-31 | Applied Software Technology, Inc. | Element alignment for hangers in computer-aided design |
US11392959B1 (en) * | 2019-02-26 | 2022-07-19 | Zodiac Systems, Llc | Method and system for equipment testing |
US11636408B2 (en) * | 2015-01-22 | 2023-04-25 | Visier Solutions, Inc. | Techniques for manipulating and rearranging presentation of workforce data in accordance with different data-prediction scenarios available within a graphical user interface (GUI) of a computer system, and an apparatus and hardware memory implementing the techniques |
Families Citing this family (237)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5995945A (en) * | 1997-08-25 | 1999-11-30 | I2 Technologies, Inc. | System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote domains |
US7783468B2 (en) * | 1998-05-13 | 2010-08-24 | Accretive Technologies, Inc. | Automated system and method for service and cost architecture modeling of enterprise systems |
GB2375863A (en) * | 2000-03-06 | 2002-11-27 | Wellogix Inc | Method and process for providing relevant data comparing proposal alternatives and reconciling proposals invoices and purchase orders with actual costs in a w |
US7881920B2 (en) * | 2000-08-29 | 2011-02-01 | Abu El Ata Nabil A | Systemic enterprise management method and apparatus |
US7155403B2 (en) | 2001-03-22 | 2006-12-26 | International Business Machines Corporation | System and method for leveraging procurement across companies and company groups |
US20040236673A1 (en) * | 2000-10-17 | 2004-11-25 | Eder Jeff Scott | Collaborative risk transfer system |
US7113900B1 (en) * | 2000-10-24 | 2006-09-26 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
US7606898B1 (en) * | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
GB0108913D0 (en) * | 2001-04-10 | 2001-05-30 | Salamander Organization The Lt | A method and apparatus for accessing software-based systems |
US7278134B2 (en) | 2001-04-27 | 2007-10-02 | International Business Machines Corporation | Three dimensional framework for information technology solutions |
CN1383060A (en) * | 2001-04-28 | 2002-12-04 | 国际商业机器中国香港有限公司 | System based on computer and method for planning electronic commerce |
GB0112277D0 (en) * | 2001-05-19 | 2001-07-11 | Mood Internat Ltd | A method and apparatus to enable flexible and dorect navigation within a graphical representation of an organisation |
US8407079B2 (en) * | 2001-06-22 | 2013-03-26 | International Business Machines Corporation | Method and system using an enterprise framework |
US7379882B2 (en) * | 2001-08-09 | 2008-05-27 | International Business Machines Corporation | Architecture designing method and system for e-business solutions |
US20030135599A1 (en) * | 2001-09-28 | 2003-07-17 | Sanger John F. | Method and system for providing a telecommuting program |
US7346539B1 (en) * | 2001-10-26 | 2008-03-18 | At&T Delaware Intellectual Property, Inc. | System and method for interpreting market forces and developing strategic business directions |
US7085837B2 (en) * | 2001-12-04 | 2006-08-01 | International Business Machines Corporation | Dynamic resource allocation using known future benefits |
US20040249832A1 (en) * | 2002-01-04 | 2004-12-09 | Goldthorpe Ward Hillary | Method for systemic enterprise knowledge management |
WO2003059738A2 (en) * | 2002-01-09 | 2003-07-24 | General Electric Company | Digital cockpit |
US20080027769A1 (en) * | 2002-09-09 | 2008-01-31 | Jeff Scott Eder | Knowledge based performance management system |
US9087319B2 (en) * | 2002-03-11 | 2015-07-21 | Oracle America, Inc. | System and method for designing, developing and implementing internet service provider architectures |
SG106068A1 (en) * | 2002-04-02 | 2004-09-30 | Reuters Ltd | Metadata database management system and method therefor |
US7346529B2 (en) * | 2002-05-07 | 2008-03-18 | David R. Flores | Method for developing an enterprise alignment framework hierarchy by compiling and relating sets of strategic business elements |
US7200601B1 (en) * | 2002-07-31 | 2007-04-03 | Bellsouth Intellectual Property Corporation | Computer-readable medium and data structure for communicating technical architecture standards to vendors |
US7424702B1 (en) | 2002-08-19 | 2008-09-09 | Sprint Communications Company L.P. | Data integration techniques for use in enterprise architecture modeling |
US20040093247A1 (en) * | 2002-08-30 | 2004-05-13 | Koninklijke Kpn N.V. | Method of developing services on an infrastructure |
US20040138932A1 (en) * | 2003-01-09 | 2004-07-15 | Johnson Christopher D. | Generating business analysis results in advance of a request for the results |
US20040138936A1 (en) * | 2003-01-09 | 2004-07-15 | Johnson Christopher D. | Performing what-if forecasts using a business information and decisioning control system |
US20040138935A1 (en) * | 2003-01-09 | 2004-07-15 | Johnson Christopher D. | Visualizing business analysis results |
TW200419413A (en) * | 2003-01-13 | 2004-10-01 | I2 Technologies Inc | Master data management system for centrally managing core reference data associated with an enterprise |
US7689676B2 (en) * | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US20040210623A1 (en) * | 2003-03-06 | 2004-10-21 | Aamer Hydrie | Virtual network topology generation |
US7890543B2 (en) * | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US8122106B2 (en) * | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US20040225583A1 (en) * | 2003-05-08 | 2004-11-11 | International Business Machines Corporation | Architecture and application return-on-investment metrics |
EP1625539A1 (en) * | 2003-05-13 | 2006-02-15 | Sag Ag | System, method, and software application for modeling the structure of enterprises |
GB0311026D0 (en) * | 2003-05-14 | 2003-06-18 | Salamander Organisation The Lt | Organisation representation framework and design process |
US7636917B2 (en) * | 2003-06-30 | 2009-12-22 | Microsoft Corporation | Network load balancing with host status information |
US7606929B2 (en) * | 2003-06-30 | 2009-10-20 | Microsoft Corporation | Network load balancing with connection manipulation |
US7590736B2 (en) * | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US8548837B2 (en) | 2003-08-20 | 2013-10-01 | International Business Machines Corporation | E-business value web |
US20050044099A1 (en) * | 2003-08-22 | 2005-02-24 | Thomas Soares | Process for creating an information services catalog |
GB0319783D0 (en) * | 2003-08-22 | 2003-09-24 | Salamander Organisation The Lt | A method and apparatus for definition referencing and navigation across multiple perspectives of an organisation |
US7676390B2 (en) | 2003-09-04 | 2010-03-09 | General Electric Company | Techniques for performing business analysis based on incomplete and/or stage-based data |
US20050075915A1 (en) * | 2003-10-07 | 2005-04-07 | Accenture Global Services Gmbh | Technology benefits realization for public sector |
US20050080654A1 (en) * | 2003-10-08 | 2005-04-14 | C.H.H. Huang | Integrated technology quality model |
US20050096948A1 (en) * | 2003-10-29 | 2005-05-05 | Ford Motor Company | Method to analyze a proposed venture transaction |
US20050096949A1 (en) * | 2003-10-29 | 2005-05-05 | International Business Machines Corporation | Method and system for automatic continuous monitoring and on-demand optimization of business IT infrastructure according to business objectives |
US20050154751A1 (en) * | 2003-11-04 | 2005-07-14 | Boardroom Software, Inc. | System and method for comprehensive management of company equity structures and related company documents with financial and human resource system integration |
US20090299909A1 (en) * | 2003-11-04 | 2009-12-03 | Levi Andrew E | System and method for comprehensive management of company equity structures and related company documents with financial and human resource system integration |
US20050137918A1 (en) * | 2003-12-17 | 2005-06-23 | International Business Machines Corporation | Method, system and program product for assessing an enterprise architecture |
US20050216320A1 (en) * | 2004-01-12 | 2005-09-29 | Brian Hattaway | Method of determining requirements for modification of a business operation |
US20050198486A1 (en) * | 2004-01-20 | 2005-09-08 | Accenture Global Services Gmbh | Information technology development transformation |
US8285578B2 (en) * | 2004-01-21 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Managing information technology (IT) infrastructure of an enterprise using a centralized logistics and management (CLAM) tool |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
US20050246529A1 (en) * | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US8849862B2 (en) * | 2004-05-21 | 2014-09-30 | Rsvpro, Llc | Architectural frameworks, functions and interfaces for relationship management (AFFIRM) |
US7849438B1 (en) * | 2004-05-27 | 2010-12-07 | Sprint Communications Company L.P. | Enterprise software development process for outsourced developers |
US20090043637A1 (en) * | 2004-06-01 | 2009-02-12 | Eder Jeffrey Scott | Extended value and risk management system |
US20050278202A1 (en) * | 2004-06-15 | 2005-12-15 | Accenture Global Services Gmbh | Information technology transformation assessment tools |
CN1716300A (en) | 2004-06-30 | 2006-01-04 | 国际商业机器公司 | Visual and modelling method for interactive rationship between entity |
US8024703B2 (en) * | 2004-10-22 | 2011-09-20 | International Business Machines Corporation | Building an open model driven architecture pattern based on exemplars |
KR100691258B1 (en) * | 2004-11-01 | 2007-03-12 | 한국전자통신연구원 | System and Method for Developing Strategic Scenario |
US7970729B2 (en) * | 2004-11-18 | 2011-06-28 | Sap Aktiengesellschaft | Enterprise architecture analysis framework database |
US20060116919A1 (en) * | 2004-11-29 | 2006-06-01 | Microsoft Corporation | Efficient and flexible business modeling based upon structured business capabilities |
US8028334B2 (en) * | 2004-12-14 | 2011-09-27 | International Business Machines Corporation | Automated generation of configuration elements of an information technology system |
US7568022B2 (en) * | 2004-12-14 | 2009-07-28 | International Business Machines Corporation | Automated display of an information technology system configuration |
US7797739B2 (en) * | 2004-12-14 | 2010-09-14 | International Business Machines Corporation | Automated verification of correctness of aspects of an information technology system |
US7937462B2 (en) * | 2004-12-14 | 2011-05-03 | International Business Machines Corporation | Verification of correctness of networking aspects of an information technology system |
US11477093B2 (en) * | 2004-12-14 | 2022-10-18 | Kyndryl, Inc. | Coupling of a business component model to an information technology model |
US7523092B2 (en) * | 2004-12-14 | 2009-04-21 | International Business Machines Corporation | Optimization of aspects of information technology structures |
US8645513B2 (en) * | 2004-12-14 | 2014-02-04 | International Business Machines Corporation | Automation of information technology system development |
US20060149754A1 (en) * | 2004-12-30 | 2006-07-06 | Alexander Dreiling | Integrated structural and process configuration |
US8489407B2 (en) | 2005-01-04 | 2013-07-16 | International Business Machines Corporation | Method of evaluating business components in an enterprise |
US20060155562A1 (en) * | 2005-01-13 | 2006-07-13 | Makoto Kano | System and method for analyzing and managing business performance |
US7395277B2 (en) * | 2005-01-25 | 2008-07-01 | International Business Machines Corporation | Content framework method |
US7685159B2 (en) * | 2005-01-25 | 2010-03-23 | International Business Machines Corporation | Creating content associations through visual techniques in a content framework system |
US7698293B2 (en) * | 2005-01-28 | 2010-04-13 | Microsoft Corporation | System and methods for capturing structure of data models using entity patterns |
JP4650039B2 (en) | 2005-03-15 | 2011-03-16 | 富士ゼロックス株式会社 | Information utilization status analysis display apparatus and method |
US20060229926A1 (en) * | 2005-03-31 | 2006-10-12 | Microsoft Corporation | Comparing and contrasting models of business |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US20060241956A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Transforming business models |
US20060293933A1 (en) * | 2005-06-22 | 2006-12-28 | Bae Systems National Security Solutions, Inc. | Engineering method and tools for capability-based families of systems planning |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
JP2007011990A (en) * | 2005-07-04 | 2007-01-18 | Hitachi Ltd | Business portfolio simulation system |
US8484065B1 (en) | 2005-07-14 | 2013-07-09 | Sprint Communications Company L.P. | Small enhancement process workflow manager |
US20070016457A1 (en) * | 2005-07-15 | 2007-01-18 | Christopher Schreiber | Prescriptive combining of methodology modules including organizational effectiveness plus information technology for success |
US20070021993A1 (en) * | 2005-07-22 | 2007-01-25 | Ankur Chandra | Method and system for constructing, managing and using enterprise architecture in a component busines model |
US7599755B2 (en) * | 2005-09-12 | 2009-10-06 | Adra Hosni I | System and method for dynamically simulating value stream and network maps |
US7489976B2 (en) * | 2005-09-12 | 2009-02-10 | Hosni I Adra | System and method for dynamically simulating process and value stream maps |
US7729934B1 (en) | 2005-09-20 | 2010-06-01 | Sprint Communications Company L.P. | System and method for strategic intent mapping |
US8566147B2 (en) | 2005-10-25 | 2013-10-22 | International Business Machines Corporation | Determining the progress of adoption and alignment of information technology capabilities and on-demand capabilities by an organization |
US7941309B2 (en) * | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US7814030B2 (en) * | 2005-11-09 | 2010-10-12 | Alfabet AG | Systems and methods for managing enterprise IT support planning |
DE102005055431A1 (en) * | 2005-11-21 | 2007-05-24 | Siemens Ag | Technical system e.g. paper machine, modernizing method for use in e.g. power plant, involves determining changes of economic value of system associated with changes of economic value of influencing variables |
US20070156503A1 (en) * | 2005-11-30 | 2007-07-05 | Accenture Global Services, Gmbh | Merger integration framework and tool |
US7953624B2 (en) * | 2006-01-18 | 2011-05-31 | P & M Holding Group, Llp | Systems and methods for facilitating delivery of consulting services |
US20070208601A1 (en) * | 2006-01-31 | 2007-09-06 | Arunkumar Ganapathi Pulianda | System for enterprise performance transformation |
US20070192149A1 (en) * | 2006-02-15 | 2007-08-16 | International Business Machines Corporation | System and method for managing risk in services solution development |
US20070203718A1 (en) * | 2006-02-24 | 2007-08-30 | Microsoft Corporation | Computing system for modeling of regulatory practices |
US9406034B2 (en) * | 2006-03-27 | 2016-08-02 | Accenture Global Services Limited | Merger integration toolkit system and method for milestone tracking |
US20080040173A1 (en) * | 2006-03-27 | 2008-02-14 | Accenture Global Services,Gmbh | Merger integration toolkit system and method for secure navigation hierarchy and workflow functionality |
US20080040180A1 (en) * | 2006-03-27 | 2008-02-14 | Accenture Global Services, Gmbh | Merger integration toolkit system and method for merger-specific functionality |
US7979513B2 (en) * | 2006-03-31 | 2011-07-12 | International Business Machines Corporation | Method and system for determining a management complexity factor for delivering services in an environment |
US8498915B2 (en) * | 2006-04-02 | 2013-07-30 | Asset Reliance, Inc. | Data processing framework for financial services |
US20070239871A1 (en) * | 2006-04-11 | 2007-10-11 | Mike Kaskie | System and method for transitioning to new data services |
US7882058B1 (en) * | 2006-04-20 | 2011-02-01 | Xfi Corporation | Method and apparatus for business resource automation |
US10460265B2 (en) * | 2006-04-25 | 2019-10-29 | International Business Machines Corporation | Global IT transformation |
US20070265899A1 (en) * | 2006-05-11 | 2007-11-15 | International Business Machines Corporation | Method, system and storage medium for translating strategic capabilities into solution development initiatives |
KR100796905B1 (en) * | 2006-06-29 | 2008-01-22 | (재)한국데이터베이스진흥센터 | System for Quality Control of DataBase |
KR100796906B1 (en) * | 2006-06-29 | 2008-01-22 | (재)한국데이터베이스진흥센터 | Method for Quality Control of DataBase |
US20080004925A1 (en) * | 2006-06-29 | 2008-01-03 | Bangel Matthew J | Multi-site project management |
US9569737B2 (en) * | 2006-08-16 | 2017-02-14 | Aware Software, Inc. | Methods and tools for creating and evaluating system blueprints |
US20080056279A1 (en) * | 2006-08-30 | 2008-03-06 | Yogesh Lund | Proactive Field Resource Planning Application |
KR100910336B1 (en) | 2006-10-19 | 2009-07-31 | 신동혁 | A system and method for managing the business process model which mapped the logical process and the physical process model |
US8346729B2 (en) * | 2006-11-18 | 2013-01-01 | International Business Machines Corporation | Business-semantic-aware information lifecycle management |
WO2008067376A2 (en) * | 2006-11-28 | 2008-06-05 | Roger Sessions | System and method for managing the complexity of large enterprise architectures |
US20080140472A1 (en) * | 2006-12-12 | 2008-06-12 | Dagan Gilat | Method and Computer Program Product for Modeling an Organization |
US20080172263A1 (en) * | 2007-01-12 | 2008-07-17 | Heyman Kirstin L | Transitioning an organization to a service management oriented organization |
US20080172276A1 (en) * | 2007-01-12 | 2008-07-17 | Burton Mary C | Apparatus, system, and method for assessing information technology environment needs |
US8140609B2 (en) * | 2007-01-25 | 2012-03-20 | International Business Machines Corporation | Congruency and similarity of information technology (IT) structures and associated applications |
US20080288622A1 (en) * | 2007-05-18 | 2008-11-20 | Microsoft Corporation | Managing Server Farms |
US20080288269A1 (en) * | 2007-05-18 | 2008-11-20 | Siemens Power Generation, Inc. | Enterprise-wide data standardization structure and method |
US20080294492A1 (en) * | 2007-05-24 | 2008-11-27 | Irina Simpson | Proactively determining potential evidence issues for custodial systems in active litigation |
EP2220601A1 (en) * | 2007-10-31 | 2010-08-25 | Paul Mulvanny | Technology enterprise management apparatus and method therefor |
JP4978432B2 (en) * | 2007-11-07 | 2012-07-18 | 株式会社日立製作所 | Business specification understanding support system and method |
US8572043B2 (en) | 2007-12-20 | 2013-10-29 | International Business Machines Corporation | Method and system for storage of unstructured data for electronic discovery in external data stores |
US8112406B2 (en) | 2007-12-21 | 2012-02-07 | International Business Machines Corporation | Method and apparatus for electronic data discovery |
CN101216910B (en) * | 2008-01-04 | 2010-11-10 | 清华大学 | Isomorphic model merging method in the modeling of distributed enterprises |
US8396869B2 (en) * | 2008-01-04 | 2013-03-12 | International Business Machines Corporation | Method and system for analyzing capabilities of an entity |
US8099711B2 (en) * | 2008-01-08 | 2012-01-17 | International Business Machines Corporation | System and method for multi-level security filtering of model representations |
US8140494B2 (en) | 2008-01-21 | 2012-03-20 | International Business Machines Corporation | Providing collection transparency information to an end user to achieve a guaranteed quality document search and production in electronic data discovery |
US10095990B2 (en) | 2008-01-24 | 2018-10-09 | International Business Machines Corporation | Developing, implementing, transforming and governing a business model of an enterprise |
JP4995127B2 (en) * | 2008-03-18 | 2012-08-08 | 株式会社リコー | Workflow management system |
US7996347B2 (en) * | 2008-04-04 | 2011-08-09 | International Business Machines Corporation | Adaptive information technology solution design and deployment |
US8812458B2 (en) | 2008-04-30 | 2014-08-19 | International Business Machines Corporation | Adaptive methodology for updating solution building block architectures and associated tooling |
US8275720B2 (en) | 2008-06-12 | 2012-09-25 | International Business Machines Corporation | External scoping sources to determine affected people, systems, and classes of information in legal matters |
US9830563B2 (en) | 2008-06-27 | 2017-11-28 | International Business Machines Corporation | System and method for managing legal obligations for data |
US8073729B2 (en) | 2008-09-30 | 2011-12-06 | International Business Machines Corporation | Forecasting discovery costs based on interpolation of historic event patterns |
US8489439B2 (en) | 2008-06-30 | 2013-07-16 | International Business Machines Corporation | Forecasting discovery costs based on complex and incomplete facts |
US8515924B2 (en) | 2008-06-30 | 2013-08-20 | International Business Machines Corporation | Method and apparatus for handling edge-cases of event-driven disposition |
US8484069B2 (en) | 2008-06-30 | 2013-07-09 | International Business Machines Corporation | Forecasting discovery costs based on complex and incomplete facts |
US8327384B2 (en) | 2008-06-30 | 2012-12-04 | International Business Machines Corporation | Event driven disposition |
US10395213B2 (en) * | 2008-09-04 | 2019-08-27 | International Business Machines Corporation | System and method for a collaborative information technology governance |
US8204869B2 (en) * | 2008-09-30 | 2012-06-19 | International Business Machines Corporation | Method and apparatus to define and justify policy requirements using a legal reference library |
US9098538B2 (en) * | 2008-10-06 | 2015-08-04 | Teradata Us, Inc. | Master data management versioning |
WO2010051583A1 (en) * | 2008-11-05 | 2010-05-14 | Software Shortlist Pty Ltd | Method for analysing business solutions |
US20100138248A1 (en) * | 2008-12-01 | 2010-06-03 | Guy Jonathan James Rackham | System and method for establishing a commercial ecosystems blueprint in an asset based component business model architecture |
US20100138272A1 (en) * | 2008-12-01 | 2010-06-03 | Guy Jonathan James Rackham | System and method for determining a threshold of decomposition for enabling incremental development of persistent and reusable business components and control structures in an asset based component business model architecture |
US20100138249A1 (en) * | 2008-12-01 | 2010-06-03 | Guy Jonathan James Rackham | System and method for structured collaboration using reusable business components and control structures in an asset based component business model architecture |
US9959510B2 (en) * | 2008-12-01 | 2018-05-01 | International Business Machines Corporation | System and method for assembly of business systems from reusable business control elements in an asset based component business model architecture |
US20100145749A1 (en) * | 2008-12-09 | 2010-06-10 | Sarel Aiber | Method and system for automatic continuous monitoring and on-demand optimization of business it infrastructure according to business objectives |
US9047575B2 (en) * | 2009-05-04 | 2015-06-02 | Oracle International Corporation | Creative process modeling and tracking system |
US20100318957A1 (en) * | 2009-06-16 | 2010-12-16 | International Business Machines Corporation | System, method, and apparatus for extensible business transformation using a component-based business model |
US8543447B2 (en) * | 2009-06-16 | 2013-09-24 | Microsoft Corporation | Determining capability interdependency/constraints and analyzing risk in business architectures |
US20110040600A1 (en) * | 2009-08-17 | 2011-02-17 | Deidre Paknad | E-discovery decision support |
US20110066570A1 (en) * | 2009-09-15 | 2011-03-17 | Brian Kolo | methods and systems for rationalizing a non-financial portfolio |
US8880682B2 (en) * | 2009-10-06 | 2014-11-04 | Emc Corporation | Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations |
US9031993B2 (en) * | 2009-10-06 | 2015-05-12 | Emc Corporation | Customizable library for information technology design and management using expert knowledge base |
US8326855B2 (en) | 2009-12-02 | 2012-12-04 | International Business Machines Corporation | System and method for abstraction of objects for cross virtual universe deployment |
WO2011075528A1 (en) | 2009-12-17 | 2011-06-23 | Fluor Technologies Corporation | Plant deliverable management system |
US8655856B2 (en) | 2009-12-22 | 2014-02-18 | International Business Machines Corporation | Method and apparatus for policy distribution |
US8250041B2 (en) | 2009-12-22 | 2012-08-21 | International Business Machines Corporation | Method and apparatus for propagation of file plans from enterprise retention management applications to records management systems |
CN101789003A (en) * | 2010-01-25 | 2010-07-28 | 刘明晶 | Method utilizing visualized graphs to indicate relevant information |
US20110208606A1 (en) * | 2010-02-19 | 2011-08-25 | Computer Associates Think, Inc. | Information Technology Services E-Commerce Arena for Cloud Computing Environments |
US20110213712A1 (en) * | 2010-02-26 | 2011-09-01 | Computer Associates Think, Ink. | Cloud Broker and Procurement System and Method |
US20110231229A1 (en) * | 2010-03-22 | 2011-09-22 | Computer Associates Think, Inc. | Hybrid Software Component and Service Catalog |
US10977587B2 (en) * | 2010-04-01 | 2021-04-13 | Northrop Grumman Systems Corporation | System and method for providing impact modeling and prediction of attacks on cyber targets |
US9430195B1 (en) | 2010-04-16 | 2016-08-30 | Emc Corporation | Dynamic server graphics |
US20110295634A1 (en) * | 2010-05-28 | 2011-12-01 | International Business Machines Corporation | System and Method for Dynamic Optimal Resource Constraint Mapping in Business Process Models |
US20110313808A1 (en) * | 2010-06-18 | 2011-12-22 | 4Tell Solutions | Built Environment Management System and Method |
US8566903B2 (en) | 2010-06-29 | 2013-10-22 | International Business Machines Corporation | Enterprise evidence repository providing access control to collected artifacts |
US8832148B2 (en) | 2010-06-29 | 2014-09-09 | International Business Machines Corporation | Enterprise evidence repository |
US8402359B1 (en) | 2010-06-30 | 2013-03-19 | International Business Machines Corporation | Method and apparatus for managing recent activity navigation in web applications |
EP2420962A1 (en) * | 2010-08-16 | 2012-02-22 | Tata Consultancy Services Ltd. | Efficient system for realizing business process families using model-driven techniques |
JP2012099071A (en) * | 2010-11-05 | 2012-05-24 | Yokogawa Electric Corp | Plant analysis system |
US20120179501A1 (en) * | 2011-01-07 | 2012-07-12 | Yolanta Beresnevichiene | Decision support |
GB201100215D0 (en) * | 2011-01-07 | 2011-02-23 | Brm Fusion Ltd | Projecting project outcome |
US20120221465A1 (en) * | 2011-02-28 | 2012-08-30 | Newsom Victor V | Clearinghouse system for monetary and non-monetary transfers of value |
US20120232948A1 (en) * | 2011-03-07 | 2012-09-13 | Wolf Kay | Information technology infrastructure risk modeling |
US9020830B2 (en) | 2011-03-08 | 2015-04-28 | Apptio, Inc. | Hierarchy based dependent object relationships |
US8726286B2 (en) | 2011-04-08 | 2014-05-13 | Microsoft Corporation | Modeling and consuming business policy rules |
US20120271779A1 (en) * | 2011-04-19 | 2012-10-25 | Cactus Commerce Inc. | Unifying domain model for internet business systems |
US20120278114A1 (en) * | 2011-04-26 | 2012-11-01 | Sap Ag | Method for dynamically reversing business functions |
US8949104B2 (en) * | 2011-05-19 | 2015-02-03 | International Business Machines Corporation | Monitoring enterprise performance |
US20120316928A1 (en) * | 2011-06-08 | 2012-12-13 | Servion Global Solutions, Ltd. | Customer interaction management blueprint |
US20130041711A1 (en) * | 2011-08-09 | 2013-02-14 | Bank Of America Corporation | Aligning project deliverables with project risks |
US9275050B2 (en) | 2011-10-24 | 2016-03-01 | Apptio, Inc. | Global dictionaries using universal primitives |
US9477698B2 (en) * | 2012-02-22 | 2016-10-25 | Salesforce.Com, Inc. | System and method for inferring reporting relationships from a contact database |
US20140136295A1 (en) | 2012-11-13 | 2014-05-15 | Apptio, Inc. | Dynamic recommendations taken over time for reservations of information technology resources |
US10417591B2 (en) | 2013-07-03 | 2019-09-17 | Apptio, Inc. | Recursive processing of object allocation rules |
US10325232B2 (en) | 2013-09-20 | 2019-06-18 | Apptio, Inc. | Allocating heritage information in data models |
US10318970B2 (en) | 2013-10-04 | 2019-06-11 | International Business Machines Corporation | Generating a succinct approximate representation of a time series |
US10395198B2 (en) | 2013-10-04 | 2019-08-27 | International Business Machines Corporation | Forecasting a time series based on actuals and a plan |
US11244364B2 (en) * | 2014-02-13 | 2022-02-08 | Apptio, Inc. | Unified modeling of technology towers |
US10607239B2 (en) | 2014-05-23 | 2020-03-31 | Customer 1 Focus, Llc | Enterprise evaluation using structured data |
US20150379419A1 (en) * | 2014-06-26 | 2015-12-31 | International Business Machines Corporation | Ghost-pattern analyzer |
WO2016036393A1 (en) * | 2014-09-05 | 2016-03-10 | Hewlett Packard Enterprise Development Lp | Enterprise service blueprint generator |
US9350740B1 (en) * | 2014-11-03 | 2016-05-24 | Jakamo Oy | Method, system and apparatus for network management based on business relationship information |
US10783468B2 (en) | 2014-12-11 | 2020-09-22 | John Sanger | Workforce virtualization |
CN104574001A (en) * | 2015-02-09 | 2015-04-29 | 国家电网公司 | Payment management method based on OLTP on-line transaction processing |
US10467574B2 (en) * | 2015-04-07 | 2019-11-05 | Conduent Business Services, Llc | Methods and systems of forecasting customer demand in a print production environment |
US9350561B1 (en) | 2015-05-27 | 2016-05-24 | Apptio, Inc. | Visualizing the flow of resources in an allocation model |
US10339467B2 (en) | 2015-06-02 | 2019-07-02 | International Business Machines Corporation | Quantitative discovery of name changes |
GB2556504A (en) | 2015-06-30 | 2018-05-30 | Apptio Inc | Infrastructure benchmarking based on dynamic cost modeling |
US10268979B2 (en) | 2015-09-28 | 2019-04-23 | Apptio, Inc. | Intermediate resource allocation tracking in data models |
US10387815B2 (en) | 2015-09-29 | 2019-08-20 | Apptio, Inc. | Continuously variable resolution of resource allocation |
US9384511B1 (en) | 2015-12-16 | 2016-07-05 | Apptio, Inc. | Version control for resource allocation modeling |
US9529863B1 (en) | 2015-12-21 | 2016-12-27 | Apptio, Inc. | Normalizing ingested data sets based on fuzzy comparisons to known data sets |
US10726367B2 (en) | 2015-12-28 | 2020-07-28 | Apptio, Inc. | Resource allocation forecasting |
US10445679B2 (en) * | 2016-04-07 | 2019-10-15 | Conduent Business Services, Llc | Labor flexibility assessment system for a document management system |
US10474974B2 (en) | 2016-09-08 | 2019-11-12 | Apptio, Inc. | Reciprocal models for resource allocation |
US10936978B2 (en) | 2016-09-20 | 2021-03-02 | Apptio, Inc. | Models for visualizing resource allocation |
US11475030B2 (en) | 2016-11-10 | 2022-10-18 | Ronald Scott Visscher | System with a unique and versatile evaluation method |
US10482407B2 (en) | 2016-11-14 | 2019-11-19 | Apptio, Inc. | Identifying resource allocation discrepancies |
US10157356B2 (en) | 2016-12-14 | 2018-12-18 | Apptio, Inc. | Activity based resource allocation modeling |
CN106776326B (en) * | 2016-12-20 | 2020-07-28 | 中国农业银行股份有限公司 | Modeling method and system of data analysis model |
US10339321B2 (en) | 2017-05-02 | 2019-07-02 | Dignity Health | Cybersecurity maturity forecasting tool/dashboard |
CN107909286A (en) * | 2017-11-29 | 2018-04-13 | 深圳百胜扬工业电子商务平台发展有限公司 | Realize a kind of technical solution of non-traditional VSM value stream analysis |
CN108256821A (en) * | 2017-12-14 | 2018-07-06 | 中国航空规划设计研究总院有限公司 | A kind of management method of construction project overall process various dimensions cost management system |
US10324951B1 (en) | 2017-12-29 | 2019-06-18 | Apptio, Inc. | Tracking and viewing model changes based on time |
US11775552B2 (en) | 2017-12-29 | 2023-10-03 | Apptio, Inc. | Binding annotations to data objects |
US10268980B1 (en) | 2017-12-29 | 2019-04-23 | Apptio, Inc. | Report generation based on user responsibility |
US10755213B2 (en) | 2018-01-10 | 2020-08-25 | Bank Of America Corporation | System for resource utilization analysis and resource alteration |
US10664498B2 (en) | 2018-04-20 | 2020-05-26 | Bank Of America Corporation | Interconnected graph structured database for identifying and remediating conflicts in resource deployment |
US10459766B1 (en) | 2018-08-20 | 2019-10-29 | Bank Of America Corporation | System for optimizing resource prioritization based on services efficiency |
US11122059B2 (en) | 2018-08-20 | 2021-09-14 | Bank Of America Corporation | Integrated resource landscape system |
CN109284092B (en) * | 2018-09-20 | 2021-06-11 | 山东电工电气集团新能科技有限公司 | Software implementation method of direct current charging pile monitoring system |
WO2021072305A1 (en) * | 2019-10-09 | 2021-04-15 | Battelle Memorial Institute | Framework to quantify cybersecurity risks and consequences for critical infrastructure |
CN112860496A (en) * | 2019-11-27 | 2021-05-28 | 华为技术有限公司 | Fault repair operation recommendation method and device and storage medium |
CA3190055A1 (en) * | 2020-08-18 | 2022-02-24 | Kevin Carr | Change management system and method |
BE1027471B1 (en) | 2020-10-08 | 2022-05-25 | Palffy Vincent | AME - Enterprise Architecture Model |
KR102264571B1 (en) | 2020-10-30 | 2021-06-15 | 주식회사 애자일소다 | Hierarchical decision agent |
CN113673817B (en) * | 2021-07-09 | 2023-11-24 | 天津大学 | Complex supply chain network system architecture modeling and adaptability evaluation method |
CN116719510B (en) * | 2023-07-05 | 2024-01-26 | 深圳市长亮科技股份有限公司 | Product modeling system for demand modeling in software development |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5813009A (en) * | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US5963910A (en) * | 1996-09-20 | 1999-10-05 | Ulwick; Anthony W. | Computer based process for strategy evaluation and optimization based on customer desired outcomes and predictive metrics |
US6134706A (en) * | 1997-08-14 | 2000-10-17 | International Business Machines Corporation | Software business objects in a multi-level organizational structure |
US6249769B1 (en) * | 1998-11-02 | 2001-06-19 | International Business Machines Corporation | Method, system and program product for evaluating the business requirements of an enterprise for generating business solution deliverables |
US6311144B1 (en) * | 1998-05-13 | 2001-10-30 | Nabil A. Abu El Ata | Method and apparatus for designing and analyzing information systems using multi-layer mathematical models |
US6442557B1 (en) * | 1998-02-27 | 2002-08-27 | Prc Inc. | Evaluation of enterprise architecture model including relational database |
US6615166B1 (en) * | 1999-05-27 | 2003-09-02 | Accenture Llp | Prioritizing components of a network framework required for implementation of technology |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5233513A (en) * | 1989-12-28 | 1993-08-03 | Doyle William P | Business modeling, software engineering and prototyping method and apparatus |
US5406477A (en) * | 1991-08-30 | 1995-04-11 | Digital Equipment Corporation | Multiple reasoning and result reconciliation for enterprise analysis |
JPH09319796A (en) * | 1996-05-31 | 1997-12-12 | Hitachi Ltd | Route analysis method and device for business process support system |
US6332154B2 (en) * | 1998-09-11 | 2001-12-18 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface |
US6370508B2 (en) * | 1998-09-11 | 2002-04-09 | Genesys Telecommunications Laboratories, Inc. | Interface engine for managing business processes within a multimedia communication-center |
US20020049573A1 (en) * | 1998-05-13 | 2002-04-25 | El Ata Nabil A. Abu | Automated system and method for designing model based architectures of information systems |
US6167564A (en) * | 1998-09-17 | 2000-12-26 | Unisys Corp. | Software system development framework |
US6424979B1 (en) * | 1998-12-30 | 2002-07-23 | American Management Systems, Inc. | System for presenting and managing enterprise architectures |
US6411936B1 (en) * | 1999-02-05 | 2002-06-25 | Nval Solutions, Inc. | Enterprise value enhancement system and method |
US6233537B1 (en) * | 1999-03-26 | 2001-05-15 | E.Piphany, Inc. | Workflow modeling language |
US20040010772A1 (en) * | 2001-11-13 | 2004-01-15 | General Electric Company | Interactive method and system for faciliting the development of computer software applications |
US7290275B2 (en) * | 2002-04-29 | 2007-10-30 | Schlumberger Omnes, Inc. | Security maturity assessment method |
-
1999
- 1999-08-20 US US09/378,514 patent/US7162427B1/en not_active Expired - Fee Related
-
2000
- 2000-08-17 MX MXPA02001823A patent/MXPA02001823A/en unknown
- 2000-08-17 NZ NZ517283A patent/NZ517283A/en not_active IP Right Cessation
- 2000-08-17 CA CA002384791A patent/CA2384791A1/en not_active Abandoned
- 2000-08-17 AU AU67818/00A patent/AU767667B2/en not_active Ceased
- 2000-08-17 CN CN00814525A patent/CN1399754A/en active Pending
- 2000-08-17 BR BR0013457-0A patent/BR0013457A/en not_active Application Discontinuation
- 2000-08-17 KR KR1020027002215A patent/KR20020026587A/en not_active Application Discontinuation
- 2000-08-17 WO PCT/US2000/022586 patent/WO2001014998A2/en not_active Application Discontinuation
- 2000-08-17 EP EP00955650A patent/EP1221109A2/en not_active Withdrawn
- 2000-08-17 JP JP2001519287A patent/JP2003524825A/en not_active Withdrawn
-
2002
- 2002-11-20 HK HK02108400.5A patent/HK1046971A1/en unknown
-
2003
- 2003-06-25 US US10/606,661 patent/US7870004B2/en not_active Expired - Fee Related
- 2003-12-22 US US10/744,347 patent/US20040143470A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5813009A (en) * | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US5963910A (en) * | 1996-09-20 | 1999-10-05 | Ulwick; Anthony W. | Computer based process for strategy evaluation and optimization based on customer desired outcomes and predictive metrics |
US6134706A (en) * | 1997-08-14 | 2000-10-17 | International Business Machines Corporation | Software business objects in a multi-level organizational structure |
US6442557B1 (en) * | 1998-02-27 | 2002-08-27 | Prc Inc. | Evaluation of enterprise architecture model including relational database |
US6311144B1 (en) * | 1998-05-13 | 2001-10-30 | Nabil A. Abu El Ata | Method and apparatus for designing and analyzing information systems using multi-layer mathematical models |
US6249769B1 (en) * | 1998-11-02 | 2001-06-19 | International Business Machines Corporation | Method, system and program product for evaluating the business requirements of an enterprise for generating business solution deliverables |
US6615166B1 (en) * | 1999-05-27 | 2003-09-02 | Accenture Llp | Prioritizing components of a network framework required for implementation of technology |
Cited By (253)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100153183A1 (en) * | 1996-09-20 | 2010-06-17 | Strategyn, Inc. | Product design |
US20060155596A1 (en) * | 2000-05-22 | 2006-07-13 | Cognos Incorporated | Revenue forecasting and sales force management using statistical analysis |
US20020035500A1 (en) * | 2000-06-05 | 2002-03-21 | Shinji Yoko | Multi-dimensional management method and system |
US20070055604A1 (en) * | 2000-07-31 | 2007-03-08 | Cognos Corporation | Enterprise planning |
US7130822B1 (en) | 2000-07-31 | 2006-10-31 | Cognos Incorporated | Budget planning |
US7693737B2 (en) | 2000-07-31 | 2010-04-06 | International Business Machines Corporation | Enterprise planning |
US7343294B1 (en) * | 2001-01-05 | 2008-03-11 | Fair Isaac Corporation | Multi-channel marketing database development methodology |
US20020138358A1 (en) * | 2001-01-22 | 2002-09-26 | Scheer Robert H. | Method for selecting a fulfillment plan for moving an item within an integrated supply chain |
US7212976B2 (en) * | 2001-01-22 | 2007-05-01 | W.W. Grainger, Inc. | Method for selecting a fulfillment plan for moving an item within an integrated supply chain |
US20020178159A1 (en) * | 2001-02-06 | 2002-11-28 | O'brien Christopher | Data mining system, method and apparatus for industrial applications |
US7228310B2 (en) * | 2001-02-06 | 2007-06-05 | Siemens Energy & Automation, Inc. | Data mining system, method and apparatus for industrial applications |
US9361593B2 (en) * | 2001-03-30 | 2016-06-07 | Oracle America, Inc. | System and method for using business services |
US20020142273A1 (en) * | 2001-03-30 | 2002-10-03 | Dollins James T. | Interactive process learning aid |
US20070208605A1 (en) * | 2001-03-30 | 2007-09-06 | Jesse Ambrose | System and method for using business services |
US20020152088A1 (en) * | 2001-04-11 | 2002-10-17 | Thomas Hogan | Method for automatically developing a strategic agribusiness plan |
US20040172272A1 (en) * | 2001-06-20 | 2004-09-02 | Shillinglaw Carol L. | Method and system for dynamically analyzing consumer feedback to determine project performance |
US20020198751A1 (en) * | 2001-06-22 | 2002-12-26 | International Business Machines Corporation | Method for improving information technology infrastructure |
US20030018490A1 (en) * | 2001-07-06 | 2003-01-23 | Marathon Ashland Petroleum L.L.C. | Object oriented system and method for planning and implementing supply-chains |
US20030028416A1 (en) * | 2001-07-12 | 2003-02-06 | Seagate Technology Llc | Evaluation to technological stragtegies |
US20030018505A1 (en) * | 2001-07-12 | 2003-01-23 | Seagate Technology Llc | Model for a strategic technology alliance |
US9203909B2 (en) | 2001-08-21 | 2015-12-01 | RPX Clearinghouse, LLC | Technique for enabling a plurality of software components to communicate in a software component matrix environment |
US8706806B2 (en) | 2001-08-21 | 2014-04-22 | Rockstar Consortium Us Lp | Technique for enabling a plurality of software components to communicate in a software component matrix environment |
US8341218B2 (en) | 2001-08-21 | 2012-12-25 | Rockstar Consortium Us Lp | Technique for enabling a plurality of software components to communicate in a software component matrix environment |
US20030065641A1 (en) * | 2001-10-01 | 2003-04-03 | Chaloux Robert D. | Systems and methods for acquiring information associated with an organization having a plurality of units |
US7346533B1 (en) * | 2001-10-24 | 2008-03-18 | Perot Systems Corporation | Method and system for utilizing best practices to satisfy requirements of a requirements specification |
US7401090B2 (en) * | 2001-11-02 | 2008-07-15 | International Business Machines Corporation | Computer-based business planning processes |
US20030088447A1 (en) * | 2001-11-02 | 2003-05-08 | Desbiens Marc A. | Computer-based business planning processes |
US20030093310A1 (en) * | 2001-11-09 | 2003-05-15 | Macrae David G. | Business management process |
US20030182651A1 (en) * | 2002-03-21 | 2003-09-25 | Mark Secrist | Method of integrating software components into an integrated solution |
US20040006505A1 (en) * | 2002-04-18 | 2004-01-08 | Cereseto Reinaldo M. | Strategic and visionary selling of information technology solutions |
US20040138942A1 (en) * | 2002-09-30 | 2004-07-15 | Pearson George Duncan | Node-level modification during execution of an enterprise planning model |
US7072822B2 (en) | 2002-09-30 | 2006-07-04 | Cognos Incorporated | Deploying multiple enterprise planning models across clusters of application servers |
US20040064349A1 (en) * | 2002-09-30 | 2004-04-01 | Humenansky Brian S. | Deploying multiple enterprise planning models across clusters of application servers |
WO2004031894A2 (en) * | 2002-09-30 | 2004-04-15 | Adaytum, Inc. | Selective deployment of software extensions within an enterprise modeling environment |
US7257612B2 (en) | 2002-09-30 | 2007-08-14 | Cognos Incorporated | Inline compression of a network communication within an enterprise planning environment |
US20040236738A1 (en) * | 2002-09-30 | 2004-11-25 | Adaytum, Inc. | Real-time aggregation of data within an enterprise planning environment |
US7111007B2 (en) | 2002-09-30 | 2006-09-19 | Cognos Incorporated | Real-time aggregation of data within a transactional data area of an enterprise planning environment |
WO2004031894A3 (en) * | 2002-09-30 | 2005-02-10 | Adaytum Inc | Selective deployment of software extensions within an enterprise modeling environment |
US20040133445A1 (en) * | 2002-10-29 | 2004-07-08 | Marathon Ashland Petroleum L.L.C. | Generic framework for applying object-oriented models to multi-tiered enterprise applications |
US20040143504A1 (en) * | 2002-12-25 | 2004-07-22 | Ming-Fang Tsai | Purchase order management system and related methods |
US20040162744A1 (en) * | 2003-02-19 | 2004-08-19 | Adam Thier | Cascaded planning of an enterprise planning model |
US7155398B2 (en) | 2003-02-19 | 2006-12-26 | Cognos Incorporated | Cascaded planning of an enterprise planning model |
US7756901B2 (en) | 2003-02-19 | 2010-07-13 | International Business Machines Corporation | Horizontal enterprise planning in accordance with an enterprise planning model |
US20040181446A1 (en) * | 2003-03-13 | 2004-09-16 | Vance Michael E. | Method, system and apparatus for managing workflow in a workplace |
US10115077B2 (en) * | 2003-06-20 | 2018-10-30 | Gaiasoft Ip Limited | System for facilitating management and organisational development processes |
US20070055564A1 (en) * | 2003-06-20 | 2007-03-08 | Fourman Clive M | System for facilitating management and organisational development processes |
US20190272502A1 (en) * | 2003-06-20 | 2019-09-05 | Gaiasoft Ip Limited | System for facilitating management and organisational development processes |
US20050049904A1 (en) * | 2003-08-25 | 2005-03-03 | Von Biedermann Almut D. | Process for business quality control |
US20050171797A1 (en) * | 2004-02-04 | 2005-08-04 | Alcatel | Intelligent access control and warning system for operations management personnel |
US7640251B2 (en) * | 2004-03-15 | 2009-12-29 | Rameo Systems Limited | Structured approach to software specification |
US20050203865A1 (en) * | 2004-03-15 | 2005-09-15 | Ramco Systems Limited | Structured approach to software specification |
US20050203913A1 (en) * | 2004-03-15 | 2005-09-15 | Ramco Systems Limited | Software life cycle availability over the internet |
US7657542B2 (en) * | 2004-03-15 | 2010-02-02 | Ramco Systems Limited | Software life cycle availability over the internet |
US20050234766A1 (en) * | 2004-04-14 | 2005-10-20 | Shuker Thomas J | Method of improving administrative functions of a business using valve streams |
US20050283400A1 (en) * | 2004-05-13 | 2005-12-22 | Ivo Nelson | System and method for delivering consulting services and information technology solutions in a healthcare environment |
US20060075467A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | Systems and methods for enhanced network access |
US20060075472A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | System and method for enhanced network client security |
US20060075506A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | Systems and methods for enhanced electronic asset protection |
US20060072583A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | Systems and methods for monitoring and displaying performance metrics |
US20060064588A1 (en) * | 2004-06-28 | 2006-03-23 | Tidwell Justin O | Systems and methods for mutual authentication of network nodes |
US7725716B2 (en) | 2004-06-28 | 2010-05-25 | Japan Communications, Inc. | Methods and systems for encrypting, transmitting, and storing electronic information and files |
US20050289655A1 (en) * | 2004-06-28 | 2005-12-29 | Tidwell Justin O | Methods and systems for encrypting, transmitting, and storing electronic information and files |
US20060026268A1 (en) * | 2004-06-28 | 2006-02-02 | Sanda Frank S | Systems and methods for enhancing and optimizing a user's experience on an electronic device |
US7760882B2 (en) | 2004-06-28 | 2010-07-20 | Japan Communications, Inc. | Systems and methods for mutual authentication of network nodes |
US20060023738A1 (en) * | 2004-06-28 | 2006-02-02 | Sanda Frank S | Application specific connection module |
US20060015805A1 (en) * | 2004-07-16 | 2006-01-19 | Humenansky Brian S | Spreadsheet user-interface for an enterprise planning system having multi-dimensional data store |
US7213199B2 (en) | 2004-07-16 | 2007-05-01 | Cognos Incorporated | Spreadsheet user-interface for an enterprise planning system having multi-dimensional data store |
US20060036479A1 (en) * | 2004-08-13 | 2006-02-16 | International Business Machines Corporation | System and method for designing secure solutions using patterns |
US8725521B2 (en) * | 2004-08-13 | 2014-05-13 | International Business Machines Corporation | System and method for designing secure business solutions using patterns |
US20060053149A1 (en) * | 2004-09-08 | 2006-03-09 | Atsushi Iwasaki | Method and system for supporting development of information systems based on EA |
US20060085237A1 (en) * | 2004-09-20 | 2006-04-20 | Shuker Thomas J | Method of improving information technology processes of a business using value stream management |
US20060080327A1 (en) * | 2004-10-07 | 2006-04-13 | Gramling Norman W | Systems and methods for information management involving taxonomy and lifespan planning |
US20060080159A1 (en) * | 2004-10-08 | 2006-04-13 | Sampath Kumar | Method, program and system for the implementation of cognitive business processes in a sales enterprise |
US20060080156A1 (en) * | 2004-10-08 | 2006-04-13 | Accenture Global Services Gmbh | Outsourcing command center |
US7870014B2 (en) * | 2004-10-08 | 2011-01-11 | Accenture Global Services Gmbh | Performance management system |
US20060085205A1 (en) * | 2004-10-08 | 2006-04-20 | Sampath Kumar | Method, program and system for the implementation of cognitive business processes |
US20060080157A1 (en) * | 2004-10-12 | 2006-04-13 | Shuker Thomas J | Method of improving administrative functions of a business using value streams with display of status |
US20060089943A1 (en) * | 2004-10-25 | 2006-04-27 | Perot Systems Corporation | Computer system and process for aiding in an outsourcing environment |
US20080215399A1 (en) * | 2004-11-23 | 2008-09-04 | Kaan Kudsi Katircioglu | Method for Business Process Mapping, Design, Analysis and Performance Monitoring |
US7841011B2 (en) | 2004-11-30 | 2010-11-23 | Siebel Systems, Inc. | Methods and apparatuses for tiered option specification |
US7958161B2 (en) | 2004-11-30 | 2011-06-07 | Siebel Systems, Inc. | Methods and apparatuses for providing hosted tailored vertical applications |
US20070239467A1 (en) * | 2004-11-30 | 2007-10-11 | Bezeau Jonathan R | Methods and apparatuses for providing provisioned access control for hosted tailored vertical applications |
US20070226031A1 (en) * | 2004-11-30 | 2007-09-27 | Manson Nicholas R | Methods and apparatuses for grouped option specification |
US8751328B2 (en) | 2004-11-30 | 2014-06-10 | Siebel Systems, Inc. | Methods and apparatuses for providing provisioned access control for hosted tailored vertical applications |
US20060143219A1 (en) * | 2004-12-29 | 2006-06-29 | Smith Laurence T | Business change lifecycle framework |
US8219661B2 (en) * | 2005-01-07 | 2012-07-10 | Lantronix, Inc. | MILARRS systems and methods |
US20120016925A1 (en) * | 2005-01-07 | 2012-01-19 | Lantronix, Inc. | Milarrs systems and methods |
US7698405B2 (en) * | 2005-01-07 | 2010-04-13 | Lantronix, Inc. | MILARRS systems and methods |
US20060156054A1 (en) * | 2005-01-07 | 2006-07-13 | Lantronix, Inc. | Milarrs systems and methods |
US10176439B2 (en) | 2005-01-11 | 2019-01-08 | International Business Machines Corporation | Managing networked resources |
US20060155564A1 (en) * | 2005-01-11 | 2006-07-13 | International Business Machines Corporation | Method and system for automatically creating and maintaining business systems using relationships |
US20060229922A1 (en) * | 2005-03-31 | 2006-10-12 | Microsoft Corporation | Association and visualization of schematized business networks |
US20060277156A1 (en) * | 2005-06-02 | 2006-12-07 | Yasmin Merican | Apparatus and method for integrating enterprise market planning processes and information systems (EMP) with enterprise resource planning processes and information systems (ERP) in emerging brand companies |
US20070027701A1 (en) * | 2005-07-15 | 2007-02-01 | Cohn David L | System and method for using a component business model to organize an enterprise |
US8326665B2 (en) * | 2005-07-15 | 2012-12-04 | International Business Machines Corporation | System and method for using a component business model to organize an enterprise |
US20070021992A1 (en) * | 2005-07-19 | 2007-01-25 | Srinivas Konakalla | Method and system for generating a business intelligence system based on individual life cycles within a business process |
US8775232B2 (en) * | 2005-08-11 | 2014-07-08 | International Business Machines Corporation | Transforming a legacy IT infrastructure into an on-demand operating environment |
US20070038648A1 (en) * | 2005-08-11 | 2007-02-15 | International Business Machines Corporation | Transforming a legacy IT infrastructure into an on-demand operating environment |
US20080215398A1 (en) * | 2005-08-12 | 2008-09-04 | Cohn David L | System and method for using a component business model to manage an enterprise |
US20070038627A1 (en) * | 2005-08-12 | 2007-02-15 | Cohn David L | System and method for using a component business model to manage an enterprise |
US20070043724A1 (en) * | 2005-08-22 | 2007-02-22 | Infosys Technologies Ltd | Systems and methods for integrating business processes |
US8538797B2 (en) * | 2005-08-22 | 2013-09-17 | Infosys Limited | Systems and methods for integrating business processes |
US20080189644A1 (en) * | 2005-08-26 | 2008-08-07 | Hung-Yang Chang | Method and system for enterprise monitoring based on a component business model |
US20070050232A1 (en) * | 2005-08-26 | 2007-03-01 | Hung-Yang Chang | Method and system for enterprise monitoring based on a component business model |
US20070239717A1 (en) * | 2005-09-01 | 2007-10-11 | International Business Machines Corporation | System and method for architecting pattern based models within a governmental framework |
US8401882B2 (en) | 2005-11-08 | 2013-03-19 | International Business Machines Corporation | Aligning information technology with business objectives through automated feedback control |
US20070168914A1 (en) * | 2005-11-08 | 2007-07-19 | International Business Machines Corporation | Aligning Information Technology with Business Objectives Through Automated Feedback Control |
US20070112945A1 (en) * | 2005-11-12 | 2007-05-17 | Lori Brown | Supply and demand project management tool |
US20070143159A1 (en) * | 2005-12-16 | 2007-06-21 | Dillard Robin A R | System and method for outcomes-based delivery of services |
US20070203766A1 (en) * | 2006-02-27 | 2007-08-30 | International Business Machines Corporation | Process framework and planning tools for aligning strategic capability for business transformation |
US8108233B2 (en) * | 2006-04-21 | 2012-01-31 | International Business Machines Corporation | Method, system, and program product for generating an integrated business organizational view |
US20070250373A1 (en) * | 2006-04-21 | 2007-10-25 | International Business Machines Corporation | Method, system, and program product for generating an integrated view |
US20070288275A1 (en) * | 2006-06-13 | 2007-12-13 | Microsoft Corporation | It services architecture planning and management |
US20080066067A1 (en) * | 2006-09-07 | 2008-03-13 | Cognos Incorporated | Enterprise performance management software system having action-based data capture |
US20080120126A1 (en) * | 2006-11-21 | 2008-05-22 | George Bone | Intelligent parallel processing system and method |
US20080162204A1 (en) * | 2006-12-28 | 2008-07-03 | Kaiser John J | Tracking and management of logistical processes |
US8645148B2 (en) * | 2006-12-29 | 2014-02-04 | The Boeing Company | Methods and apparatus providing an E-enabled ground architecture |
US20080162155A1 (en) * | 2006-12-29 | 2008-07-03 | Gregory John Small | Methods and apparatus providing an e-enabled ground architecture |
US8010397B1 (en) * | 2007-01-23 | 2011-08-30 | Sprint Communications Company L.P. | Enterprise infrastructure development systems and methods |
US20080228814A1 (en) * | 2007-03-13 | 2008-09-18 | Jefferson Raley | Determining Software Rationalization for Optimizing Information Handling System Deployments |
US20080228535A1 (en) * | 2007-03-13 | 2008-09-18 | Kevin Hanes | Information Handling System Deployment Assessment |
US20080228505A1 (en) * | 2007-03-13 | 2008-09-18 | Kevin Hanes | Client Deployment Optimization Model |
US20080228506A1 (en) * | 2007-03-13 | 2008-09-18 | Stephen Oates | Optimized Deployment Solution |
US20080255912A1 (en) * | 2007-04-12 | 2008-10-16 | Electronic Data Systems Corporation | Framework System and Method for Determining Deliverables Required to Implement a Technology-Enabled Business Change |
US20080270156A1 (en) * | 2007-04-27 | 2008-10-30 | Tony Harrell | System and method for information technology service strategy |
US20080270973A1 (en) * | 2007-04-30 | 2008-10-30 | Nigel Edwards | Deriving grounded model of business process suitable for automatic deployment |
US8904341B2 (en) | 2007-04-30 | 2014-12-02 | Hewlett-Packard Development Company, L.P. | Deriving grounded model of business process suitable for automatic deployment |
US20080288305A1 (en) * | 2007-05-15 | 2008-11-20 | Laluzerne Joseph D | Enterprise Decision Management System and Method |
US20090006147A1 (en) * | 2007-06-27 | 2009-01-01 | Harirajan Padmanabhan | Method and system for defining and managing information technology projects based on conceptual models |
US20090012800A1 (en) * | 2007-07-06 | 2009-01-08 | International Business Machines Corporation | Computer-assisted information technology service design system |
US20090037241A1 (en) * | 2007-07-31 | 2009-02-05 | M3 Planning, Inc. | Automated strategic planning system and method |
US20090037870A1 (en) * | 2007-07-31 | 2009-02-05 | Lucinio Santos-Gomez | Capturing realflows and practiced processes in an IT governance system |
US20090089121A1 (en) * | 2007-09-27 | 2009-04-02 | Siemens Aktiengesellschaft | Method and system for controlling a project |
US7933813B2 (en) | 2007-11-08 | 2011-04-26 | Christopher S. BARTON | End-to-end management of carrier services for enterprises and resellers |
US8311899B1 (en) | 2007-11-08 | 2012-11-13 | Christopher S. BARTON | Handling communication services within web interfaces used by reselling agents |
US20090125409A1 (en) * | 2007-11-08 | 2009-05-14 | Wholesale Carrier Services, Inc. | End-to-end management of carrier services for enterprises and resellers |
US20110004565A1 (en) * | 2007-12-20 | 2011-01-06 | Bryan Stephenson | Modelling Computer Based Business Process For Customisation And Delivery |
US20110004564A1 (en) * | 2007-12-20 | 2011-01-06 | Jerome Rolia | Model Based Deployment Of Computer Based Business Process On Dedicated Hardware |
US20100280863A1 (en) * | 2007-12-20 | 2010-11-04 | Lawrence Wilcock | Automated Model Generation For Computer Based Business Process |
US20100262558A1 (en) * | 2007-12-20 | 2010-10-14 | Nigel Edwards | Incorporating Development Tools In System For Deploying Computer Based Process On Shared Infrastructure |
US8365185B2 (en) | 2007-12-28 | 2013-01-29 | International Business Machines Corporation | Preventing execution of processes responsive to changes in the environment |
US8775591B2 (en) | 2007-12-28 | 2014-07-08 | International Business Machines Corporation | Real-time information technology environments |
US20090172688A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing execution within a computing environment |
US20090172670A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Dynamic generation of processes in computing environments |
US20090172682A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Serialization in computer management |
US9558459B2 (en) | 2007-12-28 | 2017-01-31 | International Business Machines Corporation | Dynamic selection of actions in an information technology environment |
US20090171706A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Computer pattern system environment supporting business resiliency |
US20090171730A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Non-disruptively changing scope of computer business applications based on detected changes in topology |
US8990810B2 (en) | 2007-12-28 | 2015-03-24 | International Business Machines Corporation | Projecting an effect, using a pairing construct, of execution of a proposed action on a computing environment |
US20090172674A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing the computer collection of information in an information technology environment |
US8868441B2 (en) | 2007-12-28 | 2014-10-21 | International Business Machines Corporation | Non-disruptively changing a computing environment |
US8341014B2 (en) * | 2007-12-28 | 2012-12-25 | International Business Machines Corporation | Recovery segments for computer business applications |
US20110093853A1 (en) * | 2007-12-28 | 2011-04-21 | International Business Machines Corporation | Real-time information technology environments |
US8826077B2 (en) | 2007-12-28 | 2014-09-02 | International Business Machines Corporation | Defining a computer recovery process that matches the scope of outage including determining a root cause and performing escalated recovery operations |
US8346931B2 (en) | 2007-12-28 | 2013-01-01 | International Business Machines Corporation | Conditional computer runtime control of an information technology environment based on pairing constructs |
US7958393B2 (en) | 2007-12-28 | 2011-06-07 | International Business Machines Corporation | Conditional actions based on runtime conditions of a computer system environment |
US8375244B2 (en) | 2007-12-28 | 2013-02-12 | International Business Machines Corporation | Managing processing of a computing environment during failures of the environment |
US8782662B2 (en) | 2007-12-28 | 2014-07-15 | International Business Machines Corporation | Adaptive computer sequencing of actions |
US20090172769A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Programmatic validation in an information technology environment |
US8326910B2 (en) | 2007-12-28 | 2012-12-04 | International Business Machines Corporation | Programmatic validation in an information technology environment |
US8763006B2 (en) | 2007-12-28 | 2014-06-24 | International Business Machines Corporation | Dynamic generation of processes in computing environments |
US20090171707A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Recovery segments for computer business applications |
US8751283B2 (en) | 2007-12-28 | 2014-06-10 | International Business Machines Corporation | Defining and using templates in configuring information technology environments |
US20090172461A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Conditional actions based on runtime conditions of a computer system environment |
US20090171731A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Use of graphs in managing computing environments |
US8682705B2 (en) | 2007-12-28 | 2014-03-25 | International Business Machines Corporation | Information technology management based on computer dynamically adjusted discrete phases of event correlation |
US8677174B2 (en) | 2007-12-28 | 2014-03-18 | International Business Machines Corporation | Management of runtime events in a computer environment using a containment region |
US20090172671A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Adaptive computer sequencing of actions |
US20090172460A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Defining a computer recovery process that matches the scope of outage |
US8447859B2 (en) | 2007-12-28 | 2013-05-21 | International Business Machines Corporation | Adaptive business resiliency computer system for information technology environments |
US8428983B2 (en) | 2007-12-28 | 2013-04-23 | International Business Machines Corporation | Facilitating availability of information technology resources based on pattern system environments |
US20090172689A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Adaptive business resiliency computer system for information technology environments |
US20090187413A1 (en) * | 2008-01-18 | 2009-07-23 | Timothy Abels | Service delivery platform for automated and remote information technology management |
US8799210B2 (en) * | 2008-02-01 | 2014-08-05 | Infosys Limited | Framework for supporting transition of one or more applications of an organization |
US20140236679A1 (en) * | 2008-02-01 | 2014-08-21 | Infosys Limited | Method and system for generating transition plans for applications of organizations |
US20110066466A1 (en) * | 2008-02-01 | 2011-03-17 | Infosys Technologies Limited | Method and system for generating transition plans for applications of organizations |
US20090288018A1 (en) * | 2008-02-01 | 2009-11-19 | Infosys Technologies Limited | Framework for supporting transition of one or more applications of an organization |
US20150081594A1 (en) * | 2008-05-30 | 2015-03-19 | Strategyn Holdings, Llc | Commercial investment analysis |
US8924244B2 (en) | 2008-05-30 | 2014-12-30 | Strategyn Holdings, Llc | Commercial investment analysis |
US8543442B2 (en) | 2008-05-30 | 2013-09-24 | Strategyn Holdings, Llc | Commercial investment analysis |
US20090299912A1 (en) * | 2008-05-30 | 2009-12-03 | Strategyn, Inc. | Commercial investment analysis |
US20120317054A1 (en) * | 2008-05-30 | 2012-12-13 | Haynes Iii James M | Commercial investment analysis |
US8655704B2 (en) * | 2008-05-30 | 2014-02-18 | Strategyn Holdings, Llc | Commercial investment analysis |
US10592988B2 (en) * | 2008-05-30 | 2020-03-17 | Strategyn Holdings, Llc | Commercial investment analysis |
US8214244B2 (en) * | 2008-05-30 | 2012-07-03 | Strategyn, Inc. | Commercial investment analysis |
US20090328010A1 (en) * | 2008-06-30 | 2009-12-31 | International Business Machines Corporation | System and method for platform-independent, script-based application generation for spreadsheet software |
US8539444B2 (en) | 2008-06-30 | 2013-09-17 | International Business Machines Corporation | System and method for platform-independent, script-based application generation for spreadsheet software |
US20100030598A1 (en) * | 2008-08-01 | 2010-02-04 | Electronic Data Systems Corporation | Platform provisioning system and method |
US8271319B2 (en) | 2008-08-06 | 2012-09-18 | Microsoft Corporation | Structured implementation of business adaptability changes |
US20100036699A1 (en) * | 2008-08-06 | 2010-02-11 | Microsoft Corporation | Structured implementation of business adaptability changes |
US20100057508A1 (en) * | 2008-09-02 | 2010-03-04 | Microsoft Corporation | Structured implementation of business functionality changes |
US20100063871A1 (en) * | 2008-09-08 | 2010-03-11 | Microsoft Corporation | Linking service level expectations to performing entities |
US8195504B2 (en) | 2008-09-08 | 2012-06-05 | Microsoft Corporation | Linking service level expectations to performing entities |
US8494894B2 (en) | 2008-09-19 | 2013-07-23 | Strategyn Holdings, Llc | Universal customer based information and ontology platform for business information and innovation management |
US20100082691A1 (en) * | 2008-09-19 | 2010-04-01 | Strategyn, Inc. | Universal customer based information and ontology platform for business information and innovation management |
US8150726B2 (en) | 2008-09-30 | 2012-04-03 | Microsoft Corporation | Linking organizational strategies to performing capabilities |
US20100082381A1 (en) * | 2008-09-30 | 2010-04-01 | Microsoft Corporation | Linking organizational strategies to performing capabilities |
US20100082380A1 (en) * | 2008-09-30 | 2010-04-01 | Microsoft Corporation | Modeling and measuring value added networks |
US20100082387A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for finding business transformation opportunities by using a multi-dimensional shortfall analysis of an enterprise |
US8145518B2 (en) | 2008-10-01 | 2012-03-27 | International Business Machines Corporation | System and method for finding business transformation opportunities by analyzing series of heat maps by dimension |
US20100082385A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for determining temperature of business components for finding business transformation opportunities |
US8175911B2 (en) | 2008-10-01 | 2012-05-08 | International Business Machines Corporation | System and method for inferring and visualizing correlations of different business aspects for business transformation |
US20100082386A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for finding business transformation opportunities by analyzing series of heat maps by dimension |
US9092824B2 (en) * | 2008-10-01 | 2015-07-28 | International Business Machines Corporation | System and method for financial transformation |
US20100082696A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for inferring and visualizing correlations of different business aspects for business transformation |
US8359216B2 (en) | 2008-10-01 | 2013-01-22 | International Business Machines Corporation | System and method for finding business transformation opportunities by using a multi-dimensional shortfall analysis of an enterprise |
US20100082407A1 (en) * | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | System and method for financial transformation |
US20100115490A1 (en) * | 2008-10-30 | 2010-05-06 | Hewlett-Packard Development Company, L.P. | Automated Lifecycle Management of a Computer Implemented Service |
US8312419B2 (en) | 2008-10-30 | 2012-11-13 | Hewlett-Packard Development Company, L.P. | Automated lifecycle management of a computer implemented service |
US20100114618A1 (en) * | 2008-10-30 | 2010-05-06 | Hewlett-Packard Development Company, L.P. | Management of Variants of Model of Service |
US8655711B2 (en) | 2008-11-25 | 2014-02-18 | Microsoft Corporation | Linking enterprise resource planning data to business capabilities |
US8244763B1 (en) * | 2008-12-18 | 2012-08-14 | The Pnc Financial Services Group, Inc. | Wiki-facilitated enterprise architecture repository |
US20100161360A1 (en) * | 2008-12-22 | 2010-06-24 | Wachovia Corporation | Strategic planning management |
US8712812B2 (en) * | 2008-12-22 | 2014-04-29 | Wells Fargo Bank, N.A. | Strategic planning management |
US20140195307A1 (en) * | 2008-12-22 | 2014-07-10 | Wells Fargo Bank, N.A. | Strategic planning management |
US9177273B2 (en) * | 2009-05-12 | 2015-11-03 | Infosys Limited | Framework for developing enterprise service architecture |
US20100293023A1 (en) * | 2009-05-12 | 2010-11-18 | Infosys Technologies, Ltd. | Framework for developing enterprise service architecture |
US9135633B2 (en) | 2009-05-18 | 2015-09-15 | Strategyn Holdings, Llc | Needs-based mapping and processing engine |
US8666977B2 (en) | 2009-05-18 | 2014-03-04 | Strategyn Holdings, Llc | Needs-based mapping and processing engine |
US20110145230A1 (en) * | 2009-05-18 | 2011-06-16 | Strategyn, Inc. | Needs-based mapping and processing engine |
US9069733B1 (en) | 2009-09-09 | 2015-06-30 | The Pnc Financial Services Group, Inc. | Enterprise architecture diagramming systems and methods |
US8347218B1 (en) | 2009-09-09 | 2013-01-01 | The Pnc Financial Services Group, Inc. | Enterprise architecture diagramming systems and methods |
US10049335B1 (en) | 2009-10-06 | 2018-08-14 | EMC IP Holding Company LLC | Infrastructure correlation engine and related methods |
US20120124104A1 (en) * | 2009-12-03 | 2012-05-17 | International Business Machines Corporation | Publishing an industry business architecture model |
US8954342B2 (en) * | 2009-12-03 | 2015-02-10 | International Business Machines Corporation | Publishing an industry business architecture model |
US20110137714A1 (en) * | 2009-12-03 | 2011-06-09 | International Business Machines Corporation | System for managing business performance using industry business architecture models |
US20110137819A1 (en) * | 2009-12-04 | 2011-06-09 | International Business Machines Corporation | Tool for creating an industry business architecture model |
US8532963B2 (en) | 2009-12-07 | 2013-09-10 | International Business Machines Corporation | Assessing the maturity of an industry architecture model |
US20110137622A1 (en) * | 2009-12-07 | 2011-06-09 | International Business Machines Corporation | Assessing the maturity of an industry architecture model |
US20110218837A1 (en) * | 2010-03-03 | 2011-09-08 | Strategyn, Inc. | Facilitating growth investment decisions |
US8583469B2 (en) | 2010-03-03 | 2013-11-12 | Strategyn Holdings, Llc | Facilitating growth investment decisions |
US20110246376A1 (en) * | 2010-03-31 | 2011-10-06 | International Business Machines Corporation | Cost benefit based analysis system for network environments |
US20150286670A1 (en) * | 2010-05-05 | 2015-10-08 | J.E. Dunn Construction Group, Inc. | System and method for managing facility content and equipment information |
US20110296021A1 (en) * | 2010-05-28 | 2011-12-01 | International Business Machines Corporation | Enabling Service Virtualization in a Cloud |
US9063791B2 (en) | 2010-05-28 | 2015-06-23 | International Business Machines Corporation | Enabling service virtualization in a cloud |
US8661132B2 (en) * | 2010-05-28 | 2014-02-25 | International Business Machines Corporation | Enabling service virtualization in a cloud |
US20120059680A1 (en) * | 2010-09-02 | 2012-03-08 | Cox Communications, Inc. | Systems and Methods for Facilitating Information Technology Assessments |
US20120303409A1 (en) * | 2011-05-26 | 2012-11-29 | Bank Of America Corporation | Enterprise Opportunity Assessment |
US8340998B2 (en) * | 2011-05-26 | 2012-12-25 | Bank Of America Corporation | Enterprise opportunity assessment |
US10789292B2 (en) * | 2012-07-23 | 2020-09-29 | Precognize Ltd. | System and method for enriching data and supporting data analysis in a hybrid environment |
US20150026219A1 (en) * | 2012-07-23 | 2015-01-22 | Raanan Manor | System and method for enriching data and supporting data analysis in a hybrid environment |
US10382275B1 (en) | 2012-10-22 | 2019-08-13 | Amazon Technologies, Inc. | Automated infrastructure configuration |
US20140172510A1 (en) * | 2012-12-18 | 2014-06-19 | Hyland Software, Inc. | Enterprise Content Management (ECM) Solutions Tool and Method |
US20160224915A1 (en) * | 2013-07-15 | 2016-08-04 | Hcl Technologies Ltd. | Alt asm |
US9842012B1 (en) * | 2013-09-13 | 2017-12-12 | Stott Creations LLC | Business rule engine message processing system and related methods |
US9836337B1 (en) * | 2013-09-13 | 2017-12-05 | Stott Creations LLC | Enterprise service bus business activity monitoring system and related methods |
US9940182B1 (en) * | 2013-09-13 | 2018-04-10 | Stott Creations LLC | Business rule engine validation systems and related methods |
US10911592B2 (en) * | 2013-09-21 | 2021-02-02 | Oracle International Corporation | Method and system for defining an offlinable model graph |
US11636408B2 (en) * | 2015-01-22 | 2023-04-25 | Visier Solutions, Inc. | Techniques for manipulating and rearranging presentation of workforce data in accordance with different data-prediction scenarios available within a graphical user interface (GUI) of a computer system, and an apparatus and hardware memory implementing the techniques |
US11030651B2 (en) * | 2016-05-06 | 2021-06-08 | Adp, Llc | Segmented user profiles |
US11392959B1 (en) * | 2019-02-26 | 2022-07-19 | Zodiac Systems, Llc | Method and system for equipment testing |
US11107295B2 (en) * | 2019-08-26 | 2021-08-31 | Applied Software Technology, Inc. | Element alignment for hangers in computer-aided design |
US11922592B2 (en) | 2019-08-26 | 2024-03-05 | Evolve Mep, Llc | Element alignment for hangers in computer-aided design |
Also Published As
Publication number | Publication date |
---|---|
WO2001014998A8 (en) | 2001-11-08 |
NZ517283A (en) | 2003-01-31 |
US7162427B1 (en) | 2007-01-09 |
CA2384791A1 (en) | 2001-03-01 |
HK1046971A1 (en) | 2003-01-30 |
WO2001014998A2 (en) | 2001-03-01 |
AU6781800A (en) | 2001-03-19 |
BR0013457A (en) | 2002-07-30 |
MXPA02001823A (en) | 2002-08-12 |
JP2003524825A (en) | 2003-08-19 |
US20040059611A1 (en) | 2004-03-25 |
AU767667B2 (en) | 2003-11-20 |
KR20020026587A (en) | 2002-04-10 |
US7870004B2 (en) | 2011-01-11 |
EP1221109A2 (en) | 2002-07-10 |
CN1399754A (en) | 2003-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU767667B2 (en) | Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business | |
Josey | TOGAF® version 9.1-A pocket guide | |
Hill | The complete project management office handbook | |
Goldenberg | CRM automation | |
WO2006041865A2 (en) | Method for reengineering of business processes | |
Cummins | Building the agile enterprise: With capabilities, collaborations and values | |
Mohapatra | Business process automation | |
Eggers et al. | No longer out of sight, no longer out of mind? How organizations engage with process mining-induced transparency to achieve increased process awareness | |
Chew et al. | Information Technology Strategy and Management: Best Practices: Best Practices | |
Dixit | Structured system analysis and design | |
PriceWaterhouseCoopers LLP et al. | The e-business workplace: Discovering the power of enterprise portals | |
Strömberg | Robotic Process Automation of office work: benefits, challenges and capability development | |
Ulrich et al. | The business capability map: the | |
Josey | The TOGAF® Standard, Version 9.2-A Pocket Guide | |
Levi et al. | FirstSTEP process modeler—a CIMOSA-compliant modeling tool | |
Bainey | Integrated IT performance management | |
Rouse et al. | Work, workflow and information systems | |
KEFYALEW | ERP PROJECT IMPLEMENTATION IN ETHIO TELECOM: AN INQUIRY INTO THE PERFORMANCE, CHALLENGES AND PROSPECTS | |
Nguyen | Implementing an issue tracking system to seek coordination improvements | |
Kondareddy | From business process reengineering to integrated process management: An exploration of issues | |
Kelkar | Strategic IT management: A concise study | |
Gomez | Service Oriented Architecture as a strategy for business improvement in the enterprise | |
Steenkamp et al. | Modeling Information and Business Systems Architectures—a Team Project | |
Verlaine et al. | Aligning a Service Provisioning Model of a Service-Oriented System with the ITIL v. 3 Life Cycle | |
Prause | Software vendors' service infusion: a generic value network of cloud-based enterprise software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ELECTRONIC DATA SYSTEMS CORPORATION, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MYRICK, CONRAD B.;HIXON, HARRY W., JR.;KOLL, CHRISTOPHER M.;AND OTHERS;REEL/FRAME:015300/0229;SIGNING DATES FROM 19990824 TO 19990829 Owner name: ELECTRONIC DATA SYSTEMS CORPORATION, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PRIBIL, MARY LYNNE;REEL/FRAME:015301/0156 Effective date: 20011031 |
|
AS | Assignment |
Owner name: ELECTRONIC DATA SYSTEMS, LLC, DELAWARE Free format text: CHANGE OF NAME;ASSIGNOR:ELECTRONIC DATA SYSTEMS CORPORATION;REEL/FRAME:022460/0948 Effective date: 20080829 Owner name: ELECTRONIC DATA SYSTEMS, LLC,DELAWARE Free format text: CHANGE OF NAME;ASSIGNOR:ELECTRONIC DATA SYSTEMS CORPORATION;REEL/FRAME:022460/0948 Effective date: 20080829 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ELECTRONIC DATA SYSTEMS, LLC;REEL/FRAME:022449/0267 Effective date: 20090319 Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.,TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ELECTRONIC DATA SYSTEMS, LLC;REEL/FRAME:022449/0267 Effective date: 20090319 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |