Massachusetts Open Standards Policy Claudia Boldman Director of Policy and Architecture Information Technology Division, MA.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Keys to Maximizing Component Reuse: Lessons and Case Studies OReilly Conference on Enterprise Java March 29, 2001 Presented by Gary Baney CTO, Flashline.com.
Migration Considerations and Techniques to MPLS-TP based Networks and Services Nurit Sprecher / Nokia Siemens Networks Yaacov Weingarten / Nokia Siemens.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Supporting New Business Imperatives Creating a Framework for Interoperable Media Services (FIMS)
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Client/Server Computing Ajay Kumar Shrivastava. Network Operating System (NOS) It manages the services of the server It exists at the session and presentation.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Chapter 2 The Origins of Software
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Enterprise Integration Architecture IPMA Professional Development Seminar June 29, 2006 Scott Came Director, Enterprise Architecture Program Washington.
Shared Technical Architecture’s Role within the ECIO Organization “Arkansas Shared Technical Architecture”
Open Document Format and the Massachusetts Open Standards Initiative Information Technology Division Commonwealth of Massachusetts.
Federal Student Aid Technical Architecture Initiatives Sandy England
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Model Driven Architecture (MDA) Partha Kuchana. Agenda What is MDA Modeling Approaches MDA in a NutShell MDA Models SDLC MDA Models (an Example) MDA -
Health Informatics Series
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
Pertemuan 15 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Information Technology Division Executive Office for Administration and Finance Shared Application Infrastructure (SAI) Program Overview.
S.ICZ Frantisek Vosejpka The enforcement of NATO INFOSEC requirements into the policy and architecture of CISs CATE 2003 Brno,
Enterprise Architecture
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Open Source Software and the Australian Government 1 Brian Catto Director, Governance and Policy Branch Australian Government Information Management Office.
Selling Consolidation’s Value. Why Consolidate? Reduce Complexity Increase Productivity Reduce TCO Improve End User Experience Improve IT Performance.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
File-Mate 1500 Design Review 1 November 19, 2013 KEVEN ABBOTT, ARCHITECT TYLER CROUSE, SPONSOR LIASON KIANA DELVENTHAL, TEAM LEADER, RECORDER LIAM WESTBY,
IBM Governmental Programs Open Computing, Open Standards and Open Source Recommendation for Governments.
Chapter 2 The Origins of Software Modern Systems Analysis and Design.
Source: J. Hoffer ,J. George, J. Valacich
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
Legacy systems overview DT Legacy System definition “Legacy system is deficiency in a system in terms of its suitability to the business, its Platform.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Improving Agility in Product Development and Pricing to Gain a Competitive Edge.
Service Oriented Architecture (SOA) at NIH Bill Jones
Provided by OSS Watch Licensed under the Creative Commons Attribution 2.0 England & Wales licence
Chapter 2 The Origins of Software Modern Systems Analysis and Design Fifth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich.
Asset Governance and Architecture Debt Ian Koenig July 2011.
Second Generation Electronic Filing Specifications Legal XML Court Filing Committee April 26, 2004.
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 2 The Origins of Software Modern Systems Analysis and Design Fifth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich.
Information Technology Division Executive Office for Administration and Finance Service Oriented Architecture An Enterprise Approach to Enabling the Business.
Proprietary vs. Free/Open Source Software
T8. Open Source Tools That are Changing the Content Technology Landscape Gilbane San Francisco 2010.
GOVERNMENT OPEN CODE COLLABORATIVE Claudia Boldman, MA Kathy Sachs, KS Mark Headd, DE.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
19 October 2004Enterprise Architecture in WSRP Portal 1 Foreword: Building Enterprise Architecture Through WSRP in Sample EPA Regional Portal FEA Goals:
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
Open Source Software in Federal Acquisitons Acquiring Maximum Agility: Beyond Open Standards TCO and Best Value Revisited.
VA’s Continuing Transformation Greg Giddens, Executive Director Enterprise Program Management Office June 19, 2013.
Basic Concepts Key Learning Points : The objectives of this chapter are as follows:  To provide an introduction to the basic Concepts of enterprise architectures,
Lecture 2 The Sources of Software. Copyright © 2011 Pearson Education, Inc. 2 Chapter 2 Introduction There are various sources of software for organizations.
1DoD Cloud Computing Read the provided excerpts from - The “25 Point Implementation Plan to Reform Federal IT” - DoD Cloud Computing Strategy - The National.
Business System Development
EI Architecture Overview/Current Assessment/Technical Architecture
Shared Technical Architecture’s Role within the ECIO Organization
Initiating systems development
Software Myths Software is easy to change
Three Reasons Why Land Solutions Should be Open and Interoperable
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Open Standards Policy in Belgium
Managed Content Services
Integrating information towards Digital ATM
Tomaž Špeh SURS TF SERV, Luxembourg,
Presentation transcript:

Massachusetts Open Standards Policy Claudia Boldman Director of Policy and Architecture Information Technology Division, MA

Agenda Overview Enterprise Open Standards Policy Enterprise Information Technology Acquisition Policy Enterprise Technical Reference Model Conclusion

Overview New IT standards announced January 12, 2004 after public comment period Three related documents: – Open Standards policy – IT Acquisition policy – Enterprise Technical Reference Model (ETRM) Intent: – Require adherence to open standards – Require consideration of all possible solutions (proprietary, open source, public sector code sharing) when making best value evaluations – Clarify distinctions between open standards and open source

Enterprise Open Standards Policy Insure interoperability across systems Open Standards definition: – Specifications for systems that are publicly available and are developed by an open community and affirmed by a standards body. Hypertext Markup Language (HTML) is an example of an open standard. Open standards imply that multiple vendors can compete directly based on the features and performance of their products. It also implies that the existing information technology solution is portable and that it can be removed and replaced with that of another vendor with minimal effort and without major interruption

Enterprise Open Standards Policy Commonwealth’s position: – Responsive government services require system integration and data sharing – IT investments must be made on the basis of TCO and best value; component-based software based on open standards enables reuse – Open systems often less costly and do not result in vendor lock-in

Enterprise Open Standards Policy Policy: – All prospective investments must comply with open standards referenced in ETRM – Existing systems will be reviewed for compatibility and enhanced where appropriate; open standards solutions will be selected when systems are retired or need major enhancements

Enterprise IT Acquisition Policy IT solutions must be selected based on best value after consideration of all possible solutions: – Proprietary – Public Sector Code Sharing – Open Source

Enterprise IT Acquisition Policy Definitions: – Proprietary Software: Software typically subject to a use fee under a license that limits access to and modification of the underlying source code, and restricts redistribution to others. – Public Sector Code Sharing: Software code that is owned by a public entity and is made available to other public entities for use and modification without royalties. – Open Source Software: Refers to software whose underlying code is available for inspection and modification by the licensee, may be available for re-distribution and may be deployed without a license fee.

Enterprise IT Acquisition Policy Commonwealth’s Position: – IT investments should reduce TCO to the Commonwealth while maximizing flexibility and reuse – IT investments should facilitate consolidation of platforms in order to achieve best value and economies of scale while meeting business requirements

Enterprise IT Acquisition Policy Best value evaluation must be conducted for IT investments that considers at a minimum: – TCO over entire period the IT solution is required – fit with identified business requirements – reliability – performance – scalability – security – maintenance requirements – legal risks – ease of customization – ease of migration

Enterprise IT Acquisition Policy Best value evaluations must include all possible solutions including: – Open standards compliant proprietary software – Open standards compliant open source software – Open standards compliant public sector code sharing at the local, state and federal levels

Enterprise Technical Reference Model (ETRM) Provides framework to identify standards, specifications and technologies that support the Commonwealth’s computing environment Goal is to build and support a Service Oriented Architecture Identifies required open standards Future versions will provide more detail on Domains, Disciplines, Technical Areas and Technical Specifications including additional open standards

Conclusion Compliance with open standards is required Open source, proprietary and public sector code sharing software must all be considered as possible solutions IT acquisition decisions continue to be made based on best value evaluations Full text of Policies and ETRM available at