Management Information Systems II Oskar Szumski, PhD University of Warsaw Faculty of Management oskar.szumski@uw.edu.pl Agenda • IT Infrastructure and Emerging Technologies • Telecommunications, the Internet and Wireless Technology • Information Systems, Organizations, and Strategy • Technology management • Building Information Systems • Enterprise Architecture, IT Governance and IT Portfolio Management • Computer systems are complex and often link multiple traditional systems potentially supplied by different software vendors • Common dilemma is how to use IT in effective and efficient way ? IT Infrastructure and Emerging Technologies IT infrastructure • IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise Connection between the firm, IT infrastructure and business capabilities Stages in IT Infrastructure evolution_1 Stages in IT Infrastructure evolution_2 Technology drivers of infrastructure evolution_1 Moore’s Law and Microprocessing Power • • • • In 1965, Gordon Moore, the directory of Fairchild Semiconductor’s Research and Development Laboratories, an early manufacturer of integrated circuits, wrote in Electronics magazine that since the first microprocessor chip was introduced in 1959, the number of components on a chip with the smallest manufacturing costs per component (generally transistors) had doubled each 18 months. This law would later be interpreted in multiple ways. There are at least three variations of Moore’s Law, none of which Moore ever stated: (1) the power of microprocessors doubles every 18 months; (2) computing power doubles every 18 months; (3) the price of computing falls by half every 18 months year. This assertion became the foundation of Moore’s Law. Moore later reduced the rate of growth to a doubling every two years The Law of Mass Digital Storage • • The world produces as much as 5 exabytes of unique information per year (an exabyte is a billion gigabytes, or 1018 bytes). The amount of digital information is roughly doubling every year (Lyman and Varian, 2003). Fortunately, the cost of storing digital information is falling at an exponential rate of 100 percent a year. The number of kilobytes that can be stored on magnetic media for $1 from 1950 to the present roughly doubled every 15 months Technology drivers of infrastructure evolution_2 Metcalfe’s Law and Network Economics • Robert Metcalfe - inventor of Ethernet local area network technology claimed in 1970 that the value or power of a network grows exponentially as a function of the number of network members. Metcalfe and others point to the increasing returns to scale that network members receive as more and more people join the network. As the number of members in a network grows linearly, the value of the entire system grows exponentially and continues to grow forever as members increase. Demand for information technology has been driven by the social and business value of digital networks, which rapidly multiply the number of actual and potential links among network members Declining Communications Costs and the Internet • Continues declining cost of communication both over the Internet and over telephone networks (which increasingly are based on the Internet). As communication costs fall toward a very small number and approach 0, utilization of communication and computing facilities explodes. How many people worldwide have now Internet access? • • • • • • • 1 10 100 1000 10000 100000 1000000……? Yes – it’s truth! WORLD INTERNET USAGE AND POPULATION STATISTICS June 30, 2012 * World Regions Population (2012 Internet Users Est.) (Dec. 31, 2000) Internet Users (Latest Data) Penetration (% Growth 2000- Users % of population) 2012 Table Africa 1,073,380,925 4,514,400 167,335,676 15.6 % 3,606.7 % 7.0 % Asia 3,922,066,987 114,304,000 1,076,681,059 27.5 % 841.9 % 44.8 % Europe 820,918,446 105,096,093 518,512,109 63.2 % 393.4 % 21.5 % Middle East 223,608,203 3,284,800 90,000,455 40.2 % 2,639.9 % 3.7 % North America 348,280,154 108,096,800 273,785,413 78.6 % 153.3 % 11.4 % Latin America / Carib. 593,688,638 18,068,919 254,915,745 42.9 % 1,310.8 % 10.6 % 35,903,569 7,620,480 24,287,919 67.6 % 218.7 % 1.0 % 7,017,846,922 360,985,492 2,405,518,376 34.3 % 566.4 % 100.0 % Oceania / Australia WORLD TOTAL * http://www.internetworldstats.com/stats.htm The IT infrastructure ecosystem Contemporary hardware platform trends • the emerging mobile digital platform (smartphones, netbooks, and tablet computers) • grid computing • virtualization • cloud computing • green computing • autonomic computing • high-performance and power-saving processors Contemporary software platform trends • Linux and open source software • software for the web: JAVA and AJAX • web services and service-oriented architecture • software outsourcing and cloud services Making wise infrastructure investments • Total cost of ownership (TCO) of technology assets - hardware and software acquisition costs account for only about 20% of TCO Total Cost of Ownership (TCO) cost components Infrastructure component Cost components Hardware acquisition Purchase price of computer hardware equipment, including computers, terminals, storage,and printers Software acquisition Purchase or license of software for each user Installation Cost to install computers and software Training Cost to provide training for information systems specialists and end users Support Cost to provide ongoing technical support, help desks, and so forth Maintenance Cost to upgrade the hardware and software Infrastructure Cost to acquire, maintain, and support related infrastructure, such as networks and specialized equipment (including storage backup units) Downtime Cost of lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks Space and energy Real estate and utility costs for housing and providing power for the technology Competitive forces model for IT infrastructure Telecommunications, the Internet, and Wireless Technology Corporate network infrastructure Physical transmission media • • • • Twisted wire Coaxial cable Fiber optics and optical networks Wireless transmission media (microwave, cellular, Wi-Fi) The global internet • The Internet has become the world’s most extensive, public communication system that now rivals the global telephone system in reach and range. • It’s also the world’s largest implementation of client/server computing and internetworking, linking millions of individual networks all over the world. Internet – how does it work? • An Internet service provider (ISP) is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers • Internet Protocol (IP) address • Domain Name System (DNS) converts domain names to IP addresses • Internet policies are established by a number of professional organizations and government bodies, including the Internet Architecture Board (IAB), which helps define the overall structure of the Internet; the Internet Corporation for Assigned Names and Numbers (ICANN), which assigns IP addresses; and the World Wide Web Consortium (W3C), which sets Hypertext Markup Language and other programming standards for the Web Major internet services CAPABILITY FUNCTIONS SUPPORTED E-mail Person-to-person messaging; document sharing Chatting and instant messaging Interactive conversations Newsgroups Discussion groups on electronic bulletin boards Telnet Logging on to one computer system and doing work on another File Transfer Protocol (FTP) Transferring files from computer to computer World Wide Web Retrieving, formatting, and displaying information (including text,audio, graphics, and video) using hypertext links The Web - components • • • • • Hypertext Markup Language (HTML) Web Servers Search Engines Web 2.0 Web 3.0 - The Future Web? Web 1.0 / 2.0 / 3.0 summary http://www.skarbiecmennicy.pl Radio-frequency identification (RFID) • RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. • An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. RFID tag • Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. • Size of tags: from 0,05 mm × 0,05 mm • Working distance: from 0,1m to 10m Types of RFID tags • RFID tags come in three general varieties: – passive (tags require no internal power source, they are only active when a reader is nearby to power them by wireless illumination), – active (tags require a power source, usually a small battery), – beacon (tags transmit autonomously with a certain blink pattern and do not respond to interrogation) Communication • To communicate, tags respond to queries generating signals that must not create interference with the readers, as arriving signals can be very weak and must be differentiated. Besides backscattering, load modulation techniques can be used to manipulate the reader's field. Typically, backscatter is used in the far field, whereas load modulation applies in the nearfield, within a few wavelengths from the reader. RFID technology in practice RFID reader sends a radio signal API (Application Programming Interface) signal transfer Database layer Tag sends data to the RFID transmitter Application Layer (eg. ERP) RFID: tag-reader-computer RFID Reference Model • Created in 2007 by CE RFID (Coordinating European Efforts for Promoting the European RFID Value Chain) • It covers to areas: – Mainly Object Tagging – Tagging with Reference or Potential Reference to Individuals RFID Reference Model RFID - Mainly object tagging RFID - Tagging with reference to individuals Example: Intel Connected Store Information Systems, Organizations, and Strategy The two-way relationship between organizations and information technology Features of organizations Routines and Business Processes • Routines (standard operating procedures) are precise rules, procedures, and practices that have been developed to cope with virtually all expected situations • Business processes are collections of such routines Organizational Politics • political struggle for resources, competition, and conflicts within organization Organizational Culture Organizational Environments Organizational Structure Other Features Disruptive technologies: winners and losers Technology Description Winners and losers Microprocessor chips (1971) Thousands and eventually millions of transistors on a silicon chip Microprocessor firms win (Intel, Texas Instruments) while transistor firms (GE) decline. Personal computers (1975) Small, inexpensive, but fully functional desktop computers PC manufacturers (HP, Apple, IBM), and chip manufacturers prosper (Intel), while mainframe (IBM) and minicomputer (DEC) firms lose. PC word processing software (1979) Inexpensive, limited but functional text editing and formatting for personal computers PC and software manufacturers (Microsoft, HP, Apple) prosper, while the typewriter industry disappears. World Wide Web (1989) A global database of digital files and “pages” instantly available Owners of online content and news benefit, while traditional publishers (newspapers, magazines, broadcast television) lose. Internet music services (1998) Repositories of downloadable music on the Web with acceptable fidelity Owners of online music collections (MP3.com, iTunes), telecommunications providers who own Internet backbone (AT&T, Verizon), local Internet service providers win, while record label firms and music retailers lose (Tower Records). PageRank algorithm A method for ranking Web pages in terms of their popularity to supplement Web search by key terms Google is the winner (they own the patent), while traditional key word search engines (Alta Vista) lose. Software as Web service Using the Internet to provide remote access to online software Online software services companies (Salesforce.com) win, while traditional “boxed” software companies (Microsoft, SAP, Oracle) lose. How information systems impact organizations Economic impacts • IT reduces both agency and transaction costs for firms, we should expect firm size to shrink over time as more capital is invested in IT. Firms should have fewer managers, and we expect to see revenue per employee increase over time Organizational and behavioral impacts • IT flattens organizations (IT pushes decision-making rights lower in the organization because lower-level employees receive the information they need to make decisions without supervision) • Postindustrial organizations (authority increasingly relies on knowledge and competence, and not merely on formal positions) • Understanding organizational resistance to change The internet and organizations • The Internet increases the accessibility, storage, and distribution of information and knowledge for organizations Implications for the design of information systems Organizational factors necessary to consider during planning a new system: • environment in which the organization must function • structure of the organization: hierarchy, specialization, routines, and business processes • organization’s culture and politics • type of organization and its style of leadership • principal interest groups affected by the system and the attitudes of workers who will be using the system • kinds of tasks, decisions, and business processes that the information system is designed to assist Porter’s competitive forces model Information system strategies for dealing with competitive forces • Low-cost leadership - Use information systems to achieve the lowest operational costs and the lowest prices • Product differentiation - Use information systems to enable new products and services, or greatly change the customer convenience in using your existing products and services. – mass customization - ability to offer individually tailored products or services using the same production resources as mass production • Focus on market niche - Use information systems to enable a specific market focus, and serve this narrow target market better than competitors • Strengthen customer and supplier intimacy - Use information systems to tighten linkages with suppliers and develop intimacy with customers. Impact of the internet on competitive forces and industry structure Competitive force Impact of the internet Substitute products or services Enables new substitutes to emerge with new approaches to meeting needs and performing functions Customers’ bargaining power Availability of global price and product information shifts bargaining power to customers Suppliers’ bargaining power Procurement over the Internet tends to raise bargaining power over suppliers; suppliers can also benefit from reduced barriers to entry and from the elimination of distributors and other intermediaries standing between them and their users Threat of new entrants The Internet reduces barriers to entry, such as the need for a sales force, access to channels, and physical assets; it provides a technology for driving business processes that makes other things easier to do Positioning and rivalry among existing competitors Widens the geographic market, increasing the number of competitors, and reducing differences among competitors; makes it more difficult to sustain operational advantages; puts pressure to compete on price The business value chain model • The value chain model highlights specific activities in the business where competitive strategies can best be applied and where information systems are most likely to have a strategic impact • Primary activities are most directly related to the production and distribution of the firm’s products and services, which create value for the customer • Support activities make the delivery of the primary activities possible • Benchmarking involves comparing the efficiency and effectiveness of your business processes against strict standards and then measuring performance against those standards • Industry best practices are usually identified by consulting companies and research organizations as the most successful solutions or problem-solving methods for consistently and effectively achieving a business objective The value chain model Extending the Value Chain – The Value Web • A value web is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively • It is more customer driven and operates in a less linear fashion than the traditional value chain The value web Network-based strategies Network Economics • Business models based on a network may help firms strategically by taking advantage of network economics. In a network law of diminishing returns does not work - the marginal costs of adding another participant are about zero, whereas the marginal gain is much larger Virtual Company Model • Virtual organization, uses networks to link people, assets, and ideas, enabling it to ally with other companies to create and distribute products and services without being limited by traditional organizational boundaries or physical locations. One company can use the capabilities of another company without being physically tied to that company Business Ecosystems: Keystone and Niche Firms • Business ecosystem is term for loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers. Business ecosystems can be characterized as having one or a few keystone firms that dominate the ecosystem and create the platforms used by other niche firms An ecosystem strategic model Using systems for competitive advantage • Sustaining competitive advantage • Aligning it with business objectives • Managing strategic transitions Technology Management • Technology Management can be defined as the integrated planning, design, optimization, operation and control of technological products, processes and services. • Technology Management is set of management disciplines that allows organization to manage its technological fundamentals to create competitive advantage. • Role of technology management function in organization is to understand the value of certain technology for the organization. Continuous development of technology is valuable as long as there is a value for the customer and therefore technology management function in organization should be able to argue when to invest on technology development and when to withdraw. Typical concepts used in technology management • technology strategy (a logic or role of technology in organization), • technology mapping (identification of possible relevant technologies for the organization), • technology roadmapping (a limited set of technologies suitable for business), • technology project portfolio (a set of projects under development), • technology portfolio (a set of technologies in use). Technology Strategy Technology mapping Technology roadmap for systems beyond 3G Technology portfolio - example • JK Technosoft (JKT) is a global software & solutions company that is driven by the simple yet powerful tenet of providing ‘total customer satisfaction’ • http://www.jktech.com/ cms/web/publishing/full Preview&pageContent =88 generations.arc.nasa.gov How can we forecast future? ? Building Information Systems 4 kinds of structural organizational change enabled by IT 1. Automation – Increase efficiency, replace manual tasks 2. Rationalization – Streamline standard operating procedures 3. Business process reengineering (BPR) – Analyze, simplify, and redesign business processes 4. Paradigm shifts – Rethink nature of business, define new business model, change nature of organization Organizational change carries risks and rewards The most common forms of organizational change are automation and rationalization. These relatively slow-moving and slow-changing strategies present modest returns but little risk. Faster and more comprehensive change—such as reengineering and paradigm shifts—carries high rewards but offers substantial chances of failure. Steps in effective reengineering • Determine which business processes should be improved • Must avoid becoming good at the wrong process • Understand how improving the right processes will help the firm execute its business strategy • Understand and measure performance of existing processes as a baseline • Even with effective BPR, majority of reengineering projects do not achieve breakthrough gains because of inadequate change management Business process management (BPM) • Helps firms manage incremental process changes • Uses process-mapping tools to: – Identify and document existing processes – Create models of improved processes that can be translated into software systems – Measure impact of process changes on key business performance indicators Capabilities of BPM software • Work flow management • Business process modeling notation • Quality measurement and management • Change management • Tools for standardizing business processes (they can be continually manipulated) • Process monitoring and analytics (verifies process performance and measures impact of process changes on key business performance indicators) Quality management • Fine-tuning business processes to improve quality in their products, services, and operations • The earlier in the business cycle a problem is eliminated, the less it costs the company • Quality improvements raise level of product and service quality as well as lower costs Quality management (cont.) • Total Quality Management (TQM): – Achievement of quality control is end in itself – Everyone is expected to contribute to improvement of quality – Focuses on continuous improvements rather than dramatic bursts of change • Six sigma: – Specific measure of quality – 3.4 defects per million opportunities – Uses statistical analysis tools to detect flaws in the execution of an existing process and make minor adjustments Information systems support quality improvements • Simplify products or processes • Make improvements based on customer demands • Reduce cycle time • Improve quality and precision of design and production • Meet benchmarking standards – Benchmarking: Setting strict standards for products, services, and other activities, and then measuring performance against those standards Overview of systems development • Systems development - activities that go into producing an information system solution to an organizational problem or opportunity • • • • • • Systems analysis Systems design Programming Testing Conversion Production and maintenance The Systems Development Process Building a system can be broken down into six core activities. Systems analysis • Analysis of problem that will be solved by system – Defining the problem and identifying causes – Specifying solutions • Systems proposal report identifies and examines alternative solutions – Identifying information requirements • Includes feasibility study – Is solution feasible from financial, technical, organizational standpoint – Is solution a good investment? – Is required technology, skill available? System analysis (cont.) • Establishing information requirements – Who needs what information, where, when, and how – Define objectives of new/modified system – Detail the functions new system must perform • Faulty requirements analysis is leading cause of systems failure and high systems development cost Systems design • Describes system specifications that will deliver functions identified during systems analysis • Should address all managerial, organizational, and technological components of system solution • Role of end users – User information requirements drive system building – Users must have sufficient control over design process to ensure that system reflects their business priorities and information needs – Insufficient user involvement in design effort is major cause of system failure Design specifications OUTPUT Medium Content Timing INPUT Origins Flow Data entry USER INTERFACE Simplicity Efficiency Logic Feedback Errors DATABASE DESIGN Logical data model Volume and speed requirements File organization and design Record specifications PROCESSING Computations Program modules Required reports Timing of outputs MANUAL PROCEDURES What activities Who performs them When How Where CONTROLS Input controls (characters, limit, reasonableness) Processing controls (consistency, record counts) Output controls (totals, samples of output) Procedural controls (passwords, special forms) SECURITY Access controls Catastrophe plans Audit trails DOCUMENTATION Operations documentation Systems documents User documentation CONVERSION Transfer files Initiate new procedures Select testing method Cut over to new system TRAINING Select training techniques Develop training modules Identify training facilities ORGANIZATIONAL CHANGES Task redesign Job redesign Process design Organization structure design Reporting relationships Programming and testing • Programming: – System specifications from design stage are translated into software program code – Software may be purchased, leased, or outsourced instead • Testing – – – – To ensure system produces right results Unit testing: Tests each program in system separately System testing: Tests functioning of system as a whole Acceptance testing: Makes sure system is ready to be used in production setting – Test plan: All preparations for series of tests Conversion • Process of changing from old system to new system • Four main strategies – – – – Parallel strategy Direct cutover Pilot study Phased approach • Requires end-user training • Finalization of detailed documentation showing how system works from technical and end-user standpoint Production and maintenance • System reviewed to determine if any revisions needed • May prepare formal postimplementation audit document • Maintenance – Changes in hardware, software, documentation, or procedures to a production system to correct errors, meet new requirements, or improve processing efficiency – 20% debugging, emergency work – 20% changes to hardware, software, data, reporting – 60% of work: User enhancements, improving documentation, recoding for greater processing efficiency Summary of systems development activities CORE ACTIVITY DESCRIPTION Systems analysis Identify problem(s) Specify solutions Establish information requirements Systems design Create design specifications Programming Translate design specifications into code Testing Unit test Systems test Acceptance test Conversion Plan conversion Prepare documentation Train users and technical staff Production and maintenance Operate the system Evaluate the system Modify the system Methodologies for modeling • Most prominent methodologies for modeling and designing systems: – Structured methodologies – Object-oriented development • Structured methodologies – Structured: Techniques are step-by-step, progressive – Process-oriented: Focusing on modeling processes or actions that manipulate data – Separate data from processes Methods • Data flow diagram: – Primary tool for representing system’s component processes and flow of data between them – Offers logical graphic model of information flow – High-level and lower-level diagrams can be used to break processes down into successive layers of detail • Data dictionary: Defines contents of data flows and data stores • Process specifications: Describe transformation occurring within lowest level of data flow diagrams • Structure chart: Top-down chart, showing each level of design, relationship to other levels, and place in overall design structure Object-oriented development • Uses object as basic unit of systems analysis and design • Object: • Combines data and the specific processes that operate on those data • Data encapsulated in object can be accessed and modified only by operations, or methods, associated with that object • Object-oriented modeling based on concepts of class and inheritance • Objects belong to a certain class and have features of that class • May inherit structures and behaviors of a more general, ancestor class Object-oriented development • More iterative and incremental than traditional structured development • Because objects reusable, object-oriented development can potentially reduce time and cost of development • Phases: – Systems analysis: Interactions between system and users analyzed to identify objects – Design phase: Describes how objects will behave and interact; grouped into classes, subclasses and hierarchies – Implementation: Some classes may be reused from existing library of classes, others created or inherited Computer-aided software engineering (CASE) • Software tools to automate development and reduce repetitive work, including – – – – – Graphics facilities for producing charts and diagrams Screen and report generators, reporting facilities Analysis and checking tools Data dictionaries Code and documentation generators • Support iterative design by automating revisions and changes and providing prototyping facilities • Require organizational discipline to be used effectively Alternative Systems-Building Methods • • • • • Traditional systems life-cycle Prototyping End-user development Application software packages Outsourcing Traditional systems lifecycle • Oldest method for building information systems • Phased approach - divides development into formal stages – Follows “waterfall” approach: Tasks in one stage finish before another stage begins • Maintains formal division of labor between end users and information systems specialists • Emphasizes formal specifications and paperwork • Still used for building large complex systems • Can be costly, time-consuming, and inflexible Prototyping • Building experimental system rapidly and inexpensively for end users to evaluate • Prototype: Working but preliminary version of information system – Approved prototype serves as template for final system • Steps in prototyping • • • • Identify user requirements Develop initial prototype Use prototype Revise and enhance prototype Prototyping (cont.) • Advantages of prototyping – Useful if some uncertainty in requirements or design solutions – Often used for end-user interface design – More likely to fulfill end-user requirements • Disadvantages – May gloss over essential steps – May not accommodate large quantities of data or large number of users – May not undergo full testing or documentation End-user development • Uses fourth-generation languages to allow end-users to develop systems with little or no help from technical specialists • Fourth generation languages: Less procedural than conventional programming languages – – – – – – – PC software tools Query languages Report generators Graphics languages Application generators Application software packages Very high-level programming languages End-user development (cont.) • Advantages: – More rapid completion of projects – High-level of user involvement and satisfaction • Disadvantages: – Not designed for processing-intensive applications – Inadequate management and control, testing, documentation – Loss of control over data • Managing end-user development – Require cost-justification of end-user system projects – Establish hardware, software, and quality standards Application software packages • Save time and money • Many packages offer customization features: • Allow software package to be modified to meet unique requirements without destroying integrity of package software • Evaluation criteria for systems analysis include: • Functions provided by the package, flexibility, user friendliness, hardware and software resources, database requirements, installation and maintenance efforts, documentation, vendor quality, and cost • Request for Proposal (RFP) • Detailed list of questions submitted to packaged-software vendors • Used to evaluate alternative software packages Outsourcing Several types – Cloud and SaaS providers • Subscribing companies use software and computer hardware provided by vendors – External vendors • Hired to design, create software • Domestic outsourcing – Driven by firms need for additional skills, resources, assets • Offshore outsourcing – Driven by cost-savings Outsourcing (cont.) • Advantages – Allows organization flexibility in IT needs • Disadvantages – Hidden costs, e.g. • Identifying and selecting vendor • Transitioning to vendor – Opening up proprietary business processes to third party Application Development for the Digital Firm • Rapid application development (RAD) – Process of creating workable systems in a very short period of time – Utilizes techniques such as: • Visual programming and other tools for building graphical user interfaces • Iterative prototyping of key system elements • Automation of program code generation • Close teamwork among end users and information systems specialists Joint application design (JAD) • Use to accelerate generation of information requirements and to develop initial systems design • Brings end users and information systems specialists together in interactive session to discuss system’s design • Can significantly speed up design phase and involve users at intense level Component-based development • Groups of objects that provide software for common functions (e.g., online ordering) and can be combined to create large-scale business applications • Web services – Reusable software components that use XML and open Internet standards (platform independent) – Enable applications to communicate with no custom programming required to share data and services – Can engage other Web services for more complex transactions – Using platform and device-independent standards can result in significant cost-savings and opportunities for collaboration with other companies Agile development • Focuses on rapid delivery of working software by breaking large project into several small sub-projects • Subprojects – Treated as separate, complete projects – Completed in short periods of time using iteration and continuous feedback • Emphasizes face-to-face communication over written documents, allowing collaboration and faster decision making Manifesto for Agile Software Development We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value: Individuals and interactions over processes and tools Working software over comprehensive documentation Customer collaboration over contract negotiation Responding to change over following a plan That is, while there is value in the items on the right, we value the items on the left more. Twelve Principles of Agile Software 1. Our highest priority is to satisfy the customer through early and continuous delivery of valuable software. 2. Welcome changing requirements, even late in development. Agile processes harness change for the customer's competitive advantage. 3. Deliver working software frequently, from a couple of weeks to a couple of months, with a preference to the shorter timescale. 4. Business people and developers must work together daily throughout the project. 5. Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. 6. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation. 7. Working software is the primary measure of progress. 8. Agile processes promote sustainable development. The sponsors, developers, and users should be able to maintain a constant pace indefinitely. 9. Continuous attention to technical excellence and good design enhances agility. 10. Simplicity--the art of maximizing the amount of work not done--is essential. 11. The best architectures, requirements, and designs emerge from self-organizing teams. 12. At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly. Enterprise Architecture, IT Governance and IT Portfolio Management Enterprise architecture • description of the structure of an enterprise, its decomposition into subsystems, the relationships between the subsystems, the relationships with the external environment, • this description should be comprehensive and include enterprise goals, business functions, business process, roles, organisational structures, business information, software applications and computer systems • Four domains of EA: Business, Information, Applications, Technology Four domains of EA: Business • Strategy maps, goals, corporate policies, operating model • Functional decompositions, business capabilities and organizational models expressed as line of business architecture • Business processes, Workflow and Rules that articulate the assigned authorities, responsibilities and policies • Organization cycles, periods and timing • Suppliers of hardware, software, and services Four domains of EA: Information • Information architecture - a holistic view on the flow of information in an enterprise • Metadata - data that describes your enterprise data elements • Data models: conceptual expressed as enterprise information architectures, logical, and physical Four domains of EA: Applications • Application software inventories and diagrams, expressed as functional or line of business architectures • Interfaces between applications (events, messages and data flows) Four domains of EA: Technology • Inter-application mediating software or 'middleware'. • Application execution environments and operating frameworks including applications server environments and operating systems, authentication and authorisation environments, security systems and operating and monitoring systems. • Hardware, platforms, and hosting: servers, datacentres and computer rooms • Local and wide area networks, Internet connectivity diagrams • Intranet, Extranet, Internet, eCommerce, EDI links with parties within and outside of the organization • Operating System • Infrastructure software: Application servers, DBMS • Programming Languages, etc. expressed as enterprise / line of business technology architecture Architecture-Centric view of IT IT Governance - definition • Specifying the decision rights and accountability framework to encourage desirable behaviour in the use of IT • The leadership and organisational structures and processes that ensure that the organisation’s IT sustains and extends the organisation’s strategies and objectives • The system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organisation and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organisation IT Governance • The rising interest in IT governance is partly due to compliance initiatives, as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization. • A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional involvement of board-level executives in IT issues was to defer all key decisions to the company's IT professionals. • IT governance implies a system in which all stakeholders, including the board, internal customers, and in particular departments such as finance, have the necessary input into the decision making process. This prevents IT from independently making and later being held solely responsible for poor decisions. It also prevents critical users from later complaining that the system does not behave or perform as expected. IT governance goals • The primary goals for information technology governance are to – assure that the investments in IT generate business value, – mitigate the risks that are associated with IT • This can be done by implementing an organizational structure with well-defined roles for the responsibility of information, business processes, applications, infrastructure, etc. • Decision rights are a key concern of IT governance; depending on the size, business scope, and IT maturity of an organization, either centralized, decentralized or federated models of responsibility for dealing with strategic IT matters are suggested IT portfolio management • IT portfolio management is the application of systematic management to large classes of items managed by enterprise Information Technology (IT) capabilities • It’s focused on quantification of previously mysterious IT efforts, enabling measurement and objective evaluation of investment scenarios Integrating Processes that reinforce architecture The Enterprise Architecture and Organizational Development Virtuous Circle Thank you for your attention! What we can expect in near future? Hype cycle • A hype cycle is a graphic representation of the maturity, adoption and business application of specific technologies. Emerging technology hype cycle Hype cycle – 5 steps • "Technology Trigger" — The first phase of a hype cycle is the "technology trigger" or breakthrough, product launch or other event that generates significant press and interest. • "Peak of Inflated Expectations" — In the next phase, a frenzy of publicity typically generates over-enthusiasm and unrealistic expectations. There may be some successful applications of a technology, but there are typically more failures. • "Trough of Disillusionment" — Technologies enter the "trough of disillusionment" because they fail to meet expectations and quickly become unfashionable. Consequently, the press usually abandons the topic and the technology. • "Slope of Enlightenment" — Although the press may have stopped covering the technology, some businesses continue through the "slope of enlightenment" and experiment to understand the benefits and practical application of the technology. • "Plateau of Productivity" — A technology reaches the "plateau of productivity" as the benefits of it become widely demonstrated and accepted. The technology becomes increasingly stable and evolves in second and third generations. The final height of the plateau varies according to whether the technology is broadly applicable or CRM hype cycle