Implementing Enterprise Architectures If We Build It, Will They Come? Mark L. Hess Weston Technology Management Group

Slides:



Advertisements
Similar presentations
1 The IT Service Management Performance Challenge IT Service Management in the Federal Sector – A Case Study.
Advertisements

12 August 2004 Strategic Alignment By Maria Rojas.
IT Doesn’t Matter By Alex Cheong Germaine Wong Julie Laffy.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
4/15/2017 5:36 AM 1 © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
“Necessity is the Mother of Invention” Gaining Value from Regulatory Demands Kevin Butcher Senior Vice-President, Enterprise Systems, BMO Financial Group.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Virtualizing Enterprises: Challenges Harrick M. Vin Vice President and Chief Scientist Tata Research Development and Design Centre, Tata Consultancy Services.
Enterprise Architecture. 2 Agenda What is Enterprise Architecture (EA)? Roles in EA? Why is EA Important? Tangible Benefits from EA? What Do We Need to.
Developing Information Security Policy. Why is Developing Good Security Policy Difficult? Effective Security/IA Policy is more than locking doors and.
Enterprise Integration Architecture IPMA Professional Development Seminar June 29, 2006 Scott Came Director, Enterprise Architecture Program Washington.
Government Connect Connected Government Framework Nigel Tilley, Industry Strategy Consultant, Microsoft.
Thee-Framework for Education & Research The e-Framework for Education & Research an Overview TEN Competence, Jan 2007 Bill Olivier,
ITPA Luncheon March 12, 2015 Emerging Role of the CTO.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Enterprise Systems Organizations are finding benefits from using information systems to coordinate activities and decisions spanning multiple functional.
EXCELLENCE CANADA UNIVERSITY OF WATERLOO LIBRARY PILOT April 22, 2014 Excellence Canada – University of Waterloo Library Pilot.
User training and driving adoption PPM system configuration to “meet” with the methodology Choose between on- premises or online PPM methodology implementation.
Information Technology Audit
Maximize Opportunity. Minimize Risk. Banking in the Flat World A View Point.
Sanbolic Enabling the Always-On Enterprise Company Overview.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
12 Enterprise and Global Management of e-Business Technology.
Lessons Learned in Smart Grid Cyber Security
Foundations of information systems
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
What is Enterprise Architecture?
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
AN INVITATION TO LEAD: United Way Partnerships Discussion of a New Way to Work Together. October 2012.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
Centralizing Collections By William Miller Miller Consulting Miller ConsultantsMiller Consultants.
The Challenge of IT-Business Alignment
Operational Excellence and Sustainable Performance Improvement Date: 9 June, 2009.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
Red Means Go Office of Information Technology Future Directions for OIT OIT Staff Meeting Monday, March 9, 2009 Marc Hoit, Ph.D. Vice Chancellor for IT.
© 2013 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Achievement of an Integrated Applications Environment Enterprise.
Commonwealth IT Consolidation Background and Basic Talking Points (Update Title as Needed) Committee or Person Presenting Date MM/DD/YYYY.
IS & KM (INFO 640) L2: IS Planning GP Dhillon, PhD Associate Professor of IS School of Business, VCU.
SOA Management Packs & Governance Cheat Sheet (Shared under OPN NDA - Last Updated: 8/3/2009)OPN NDA Target Account Profile Enterprises that: Have IT infrastructure.
8.1 Lawson Security Overview Del Dehn Product Manager.
TI Tata Kelola Sistem dan Teknologi Informasi BISNIS &
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
Enterprise and Global Management of e-Business Technology
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
SHAPING THE ROLE OF HR: Tactics for Strategic Change.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Maximizing the Value of Investments in Tax Administration Terry Lutes Principal, M Group.
Enterprise Architecture HOW COMPANIES ARE EXPLOITING INFORMATION TO THROUGH IT.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
SAM for SQL Workloads Presenter Name.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Main Function of SCM (Part I)
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Commonwealth IT Consolidation Background and Basic Talking Points Date MM/DD/YYYY.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
Chapter 5 Creating Business Value © John Wiley & Sons Canada, Ltd.5-1.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
The Commonwealth IT Reorganization 2005 Mike Inman Commissioner of Technology.
Updating the Value Proposition:
Section 1 Delivering Value with IT
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Chapter 9 Corporate-Level Strategy: Horizontal Integration, Vertical Integration, and Strategic Outsourcing.
Chapter 9 Corporate-Level Strategy: Horizontal Integration, Vertical Integration, and Strategic Outsourcing.
The People Ready Vision for Business in the Enterprise
Chapter 9 Corporate-Level Strategy: Horizontal Integration, Vertical Integration, and Strategic Outsourcing.
Costs & benefits of investments in OSH: MSEs
Presentation transcript:

Implementing Enterprise Architectures If We Build It, Will They Come? Mark L. Hess Weston Technology Management Group

2 User compliance depends upon resolving four key issues: Which standards are chosen and why? What governance model best builds user support? What benefits will the architecture deliver, to whom and when? Which implementation strategies will grow user compliance?

3 Enterprise architectures originated in the move to Open Systems and Client/Server in the 1990s The mainframe management paradigm broke The result: two of the most challenging IT management issues today: –The management of technological (and business process) complexity –The shared management of IT resources Centralized Hierarchical Distributed Heterogeneous

4 Architectures and Standards Reduce Complexity Complexity is an enterprise problem, not a user problem

5 The choice of a standard is a tradeoff between “granularity” and “workability” What is a standard? Is a standard a “product”? Does the standard need to be one “thing”? How and when will the standard evolve?

6 Standards provide strategic direction over time What Does the Standard Do? Provides identity management services (e.g., authentication, authorization, personalization, certificate handling and other application development services) and central administration of IT assets. Why is a Standard Needed? To consolidate 3 current Directory Services products to one and to develop a full-function, common infrastructure for use by application developers. To comply with corporate standards effective June What Should Users Do: The strategic direction for Directory Services is MS Active Directory. Novell E-directory and Lotus Domino will be stabilized, with no further enhancements. These products will be repaired as needed. MS Active Directory will be operational during 1QFY07. Existing HQ server migration will be piloted in 1QFY07 with data migration completed by 3QFY07. Field office migration will be piloted 1QFY07 and completed by 4QFY07. Data migration from Novell to Active Directory will be completed by Oct 07. What Should Users Avoid: Further development using Novell E-directory or Lotus Domino. Standard Timeline:

7 Which standard to choose is a trade-off Choose the most granular standard possible that users can and will adopt Economy of Scale (Granularity) User Compliance (Workability)

8 Today’s enterprises have many IS organizations Each “owns” IT resources and functions Each needs a “voice” if they are to work together to achieve a common goal –For many enterprises, EA is the first time they need to work together Governance describes who is responsible for what and how decisions will be made

9 A “constitution” is a shared management model for peer organizations Preamble – the shared goals and benefits Constituents – who is affected Executive Responsibility –who is responsible for the architecture and standards Legislative Responsibility – how will the “laws” be decided Judicial Responsibility – what is the penalty for non-compliance Amendments – how and when will the architecture and standards evolve

10 Value propositions describe what benefits will be delivered, to whom and when Enterprise architectures are developed by the enterprise, to solve enterprise problems, with the benefits accruing to the enterprise For users, compliance is a trade-off between upfront costs and potential future benefits Enterprise management and business unit management are different constituencies

11 Value propositions must address the needs of each constituency Enterprises want economy of scale –By standardizing the IT environment, complexity is reduced and consolidations become possible and support and service becomes focused Business units want interconnectivity and interoperability –Access to enterprise resources, data quality, less rework, better support and service and lower costs These are often “two sides of the same coin” Two value propositions are needed, not one

12 Value propositions must answer the “WIFFM” question Business Context –Mission (or business objectives) –Obstacles –Linkage Benefits –Efficiency – cost and productivity –Effectiveness – value Timing

13 Implementation means user compliance

14 Winning implementation strategies recognize and mitigate these barriers Seek breadth and depth Focus on new investments Find partners Develop intercept strategies Provide help Market the successes Compliance, like a snowball, grows over time as more and more users align with the architecture

15 To gain user compliance: Choose standards for “workability” Adopt a “shared management” governance model Develop two value propositions Develop implementation strategies that mitigate user constraints Expect compliance over time Develop and market the benefits “story”