VA Internal Use Only 1 Product Architecture Recommendation Briefing Template.

Slides:



Advertisements
Similar presentations
INTOSAI IT Audit IT Methods Awareness
Advertisements

An Overview of the Federal Segment Architecture Methodology
Title Presented by: For: Date:. Summary The summary is intended to provide the audience with a quick overview and basic understanding of the essential.
Human Factors Integration for MODAF: Needs and Solution Approaches Anne Bruseberg Systems Engineering & Assessment Ltd, UK (HFI DTC) Gavan Lintern General.
TITLE OF PROJECT PROPOSAL NUMBER Principal Investigator PI’s Organization ESTCP Selection Meeting DATE.
Enterprise Architecture 2013 ITLC & ITAG Leadership Meeting Discussion Points April 9, 2013.
<<Date>><<SDLC Phase>>
Centers for Medicare & Medicaid Services eXpedited Life Cycle (XLC) [Insert Project Name] Post Implementation Review (PIR) [Insert Date of PIR] [Insert.
Post Implementation Review (PIR) [Insert Date of PIR]
Federal Student Aid Technical Architecture Initiatives Sandy England
IT Governance and Management
درس مهندسی نیازمندی ها استاد دکتر عبداله زاده دانشجو خیرالنسا مرچانت Dealing with NFR : Three Experimental Studies of a Process-Oriented Approach.
1 ECCF Training 2.0 Introduction ECCF Training Working Group January 2011.
AD description template definition Marián Mlynarovič FIIT Lectures 2006.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
[Insert Exercise Name] Evaluator Briefing and Guidance.
[Organization’s Name] [Author’s Name] [Date]
The topics addressed in this briefing include:
Kris Hicks-Green April 23, 2013 IIBA Austin
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
The Vision Document 1. Importance of a Vision Document  It describes the application in general terms, including descriptions of the target market, the.
CloseLaunchCommitCloseLaunchCommitInvestInvestLaunchBuildPlanExplore PRODUCT ENGINEERING – PLC INVEST DECISION.
What is Business Analysis Planning & Monitoring?
Enterprise NASA Will Peters August, 2010.
0 Un ited States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Enterprise Architecture Working Group.
Technical e-business Architecture Method TEAM Practice Steps.
RUP Requirements RUP Artifacts and Deliverables
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
Training Needs Analysis Report Rapid Analysis and Design (RAD)
Business Analysis and Essential Competencies
BMAN Integrative Team Project Week 2 Professor Linda A Macaulay.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Role-Based Guide to the RUP Architect. 2 Mission of an Architect A software architect leads and coordinates technical activities and artifacts throughout.
Project Life Cycle – Project Initiation © Ed Green Penn State University All Rights Reserved.
Process Assessment Method
Requirements as Usecases Capturing the REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
System Context and Domain Analysis Abbas Rasoolzadegan.
Project X Group Y Presenters: (indicate roles). Part I: Project Overview System provides functionality X Motivation for project –Address problem with…
Community Resources Assessment Training 4-1. Community Resources Assessment Training 4-2.
1 ECCF Training 2.0 Introduction ECCF Training Working Group January 2011.
1 | 2010 Lecture 3: Project processes. Covered in this lecture Project processes Project Planning (PP) Project Assessment & Control (PAC) Risk Management.
Chapter 3 Strategic Information Systems Planning.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
(c) Adaptive Processes Consulting Be with the Best!
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
The Project Plan Plan Your Work, then Work Your Plan
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
UML - Development Process 1 Software Development Process Using UML.
Continual Service Improvement Methods & Techniques.
Select Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
1 Essential Software Architecture Documenting a Software Architecture.
Federal Enterprise Architecture (FEA)
Service Management World Class Operations - Impact Workshop.
Data Architecture World Class Operations - Impact Workshop.
Physical Data Model – step-by-step instructions and template
Identify the Risk of Not Doing BA
Group Y Presenters: (indicate roles)
Team Members: Member1, … Spring 2013
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
Vijay Rachamadugu and David Snyder September 7, 2006
Employee engagement Delivery guide
Principal Investigator ESTCP Selection Meeting
Overview of Business Area Strategy and Products and Services
Stumpf and Teague Object-Oriented Systems Analysis and Design with UML
Stumpf and Teague Object-Oriented Systems Analysis and Design with UML
Principal Investigator ESTCP Selection Meeting
Presentation transcript:

VA Internal Use Only 1 Product Architecture Recommendation Briefing Template

VA Internal Use Only 2 Presentation Overview The purpose of this briefing is to provide to management an overview of finding and recommendations on the architectural assessment of the product architecture The decision gates for completing this step include Business Governance, Data Governance, Technology Governance, Chief Architect Governance, and Capital Planning Governance. This briefing will describe the summary results of the target business products and services, Architecture decisions, ADS target decisions, and Product Architecture Overview.

VA Internal Use Only 3 Current-State Overview

Future-State Overview VA Internal Use Only 4 –Capture, integrate and share information from other sources –Identify needs (training, resources, etc.) –Measure performance of programs and their management –Meet reporting requirements –Analyze and prioritize LOB-mandated efforts –Justify requests and expenditures –Manage veterans-oriented service programs The conceptual architecture will give the VA an enhanced ability to:

VA Internal Use Only 5 Business Architecture

VA Internal Use Only 6 : –Conceptual Business Diagram –Business Process Diagram, showing lines of business covered Business Architecture – Models

VA Internal Use Only 7 Data Architecture

VA Internal Use Only 8 Functional Requirements

VA Internal Use Only 9 Application Architecture <Summarize the dynamic and hierarchical decomposition of the physical resources Summarize the description of the Interface Requirements Summarize security considerations, including authentication, au>thorization, confidentiality, integrity

Non-Functional Requirements VA Internal Use Only 10

VA Internal Use Only 11 : –Business Services Maturity Matrix points – near-term and long-term –Describe in 2-3 paragraphs how the conceptual architecture meets the service needs Service Oriented Architecture

VA Internal Use Only 12 Include Services model illustrations Service Oriented Architecture - Models

Technology Architecture VA Internal Use Only 13

Technology Architecture - Models VA Internal Use Only 14

Security Architecture <Summarize how security architecture interacts with all other constituent architecture domains of SA: Business, Data, Application, and Technology. Briefly describe how the Security Architecture will determine the appropriate user roles, security levels, and procedures. With regards to Data Architecture, briefly describe how the Security Architecture will determine various types of data security. > VA Internal Use Only 15

Security Architecture VA Internal Use Only 16

VA Internal Use Only 17 Re-use Highlights Highlight what systems (from what organizations) are key for re-use in target services highlighting rationale Highlight what enterprise services (from what organizations) are key for re-use in target services highlighting rationale Highlight what federal services (from what organizations) are key for re-use in target services highlighting rationale (Next slides will discuss Authoritative Data Source Re-use)

VA Internal Use Only 18 Major Gaps and Alternative Analysis: Highlight what key Gaps that need extra resolve and (from what organizations) are key for re-use in target services highlighting rationale. Highlight tactical wins in alternative analysis (near-term) along with long- term end-service solutions Architecture (long-term) Include architectural risks that should be considered

VA Internal Use Only 19 Major Gaps and Alternative Analysis: (cont.) Cover 1 or 2 from each Architecture domain areas

Gap Analysis – Architectural Decisions VA Internal Use Only 20 Capture 2-5 highlights summarizing and noting specific rationale for Architectural Decisions (From the Product Evaluation and Decision Analysis)

VA Internal Use Only 21 Governance Input Request In general, each governance team will have a separate focus. Target your conclusion based on who your audience is: –Business Governance (will focus on business services) –Data Governance (will review of data artifacts, ADS, and data services) –Technology Governance (will focus on Support services and enabling services. Feedback will likely focus on closing the gap on service rationale, gap/alternative analysis, and proposing enterprise license re- use opportunities. –Chief Architect Governance (will provide input on all services but likely focused on service re-use and identifying enterprise service opportunities –Capital Planning Governance (will key in on portfolio re-use and new investment needs)