Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Engagement Approach
Audience
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1
Communicate business strategy effectively by using diagrams, charts, and written descriptions, and then collect, update, and manage initiative requests and related information via common productivity tools and business drawing tools, and then storing information in centralized and categorized libraries
Collect project investment requests and establish a system to rank and assess them via a centralized managed list or spreadsheet tool
Prove investment worth by defending investment positioning via spreadsheet or list-based models that use objective formulas for scoring
Report corporate effectiveness or failure via project reports that are created from standardized templates in common productivity applications, and are stored in centralized locations
Get early performance information regarding projects via on-demand time-phased reports, charts and health indicators, and status reports that are created in common productivity applications
Identify and collect information about project risks and issues via managed-list repositories or automated surveys that capture data specific to the risk
Phase 2
Collect and objectively prioritize business drivers, and then drive consensus among executives via a business driver collection tool and a pair-wise comparison matrix
Identify and select project investment requests by scoring that is aligned with business drivers via a
Web-based portfolio inventory tool
Select investments based on rational decisions rather than emotions via structured portfolio optimization analysis, by using what-if scenarios to identify tradeoffs and select the optimal portfolio under varying budgetary and business constraints
Make KPIs and underlying performance data available organization-wide via integration from across various project repositories for a consolidated view of information regarding the scoring of business initiatives
Make better decisions by standardizing work effort reporting via customized reports that show metrics such as progress and track actuals by percentage of work complete, actual work done, and work remaining; and that show budget vs. forecast built from multi-dimensional "cubes" from the database
Identify and fix problems at a project level by using risk mitigation via a Web-based risk management tool that associates risks and issues with tasks and projects, so that teams can collaborate on specifying probability and impact, assigning ownership, and tracking progress to manage risk more efficiently
Phase 3
Provide organizational control and action according to business strategy via a portfolio management system that prioritizes initiatives for the upcoming planning period; uses the Business
Alignment Framework to optimize budgets and recommend portfolios; employs sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints; and uses advanced portfolio analytical techniques
Enable a rationalized approach to choose which investments have the highest return and alignment to business strategy via investment maps to effectively evaluate competing investments from multiple perspectives, by using methodologies such as the
Business Alignment Framework to optimize budgets and recommend portfolios; and sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints
Enhance the business value of the portfolio, to ensure that the mix of investments aligns to established business strategy via performing advanced portfolio optimization analysis such as
Efficient Frontier modeling, to identify and break constraints and gain more business value from the portfolio; providing enterprise-wide integration across various project repositories; and transferring information about the scoring of business initiatives to ERP systems
Automate action on trends, alerts, and performance via portfolio dashboards and scorecards that show the contribution of the portfolio, for decision-making through trend and performance analysis
Transmit work effort to LOB and financial systems, pull metrics from financial systems, and combine the results in a comprehensive corporate reporting portal via integration packages that feed to and from project databases and push information into business intelligence portals and reporting applications
Build tools to support a comprehensive risk management program via risk dashboards that use heat maps to provide real-time data to identify risks, and workflow-based approaches to manage and aggregate risk, including change and approval processes for risk visibility, documentation, and mitigation
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1
Measure financial performance per project via spreadsheet-based reporting and analysis for measuring performance
Maintain a list of projects that is distributed to executives across the organization via a centralized managedlist repository, table, or spreadsheet to show the top-line status of projects
Track organization-wide budget performance via desktop spreadsheets that are stored in a centralized location
Phase 2
Track financial performance consistently across all projects and initiatives via server-enforced data entry rules in the project management system and enterprise-wide reporting dashboards to show actuals vs. forecasts
Eliminate duplicate work effort by making work performed and the results more visible via enterprise search that uses standardized keywords and portfolio views to show all current and proposed work and via graphical representations of project portfolios and initiative work
Select investments based on prioritized business value and budget via a portfolio selection system that uses a pair-wise comparison tool to objectively assign value to business drivers, provides cost-sensitive resource allocation based on business initiatives, and prioritizes initiatives for the upcoming planning period
Phase 3
Ensure that project financial data automatically flows into and from financial systems via a realtime integration framework that is built on standard Web services to enable connectivity, data access, and event handling between the project management system and other applications with a bi-directional feed to general ledger systems, to compare corporate accounting to project accounting
Reduce effort on low-value projects and programs via reports and scorecards for ratio analysis of cost
(spend) and benefits; tracking portfolio return on investment (ROI); dynamic assessment of the impact on the project or program portfolio; monitoring the performance of each investment to ensure realization of forecasted benefits; and ongoing alignment and portfolio optimization to enable selection of the right programs and to halt existing programs which allows pending programs to begin
Plan demand-management scenarios and make informed decisions about outsourcing via a portfolio management system that uses an efficient frontier analysis to identify and break constraints that prohibit achievement of an optimal portfolio; employs sophisticated optimization algorithms to determine the optimal project or program portfolio under varying budget and business constraints; and uses advanced portfolio analysis techniques
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1
Assess capacity vs. demand on a skill level via spreadsheets or managed-list repositories to collect skill-set data
Assign resources as they're needed without formal processes via spreadsheets or project-oriented views of managed lists
Track resource performance per project manually via e-mail collaboration by enabling project managers and team members to send and receive task status information
Phase 2
Find the right people based on matching their skills, identify optimal project start dates, and assess when to delay projects via an enterprise project management system that centrally stores all resource information including assignments, usage, availability, and skills across the organization; and then selects resources from the enterprise resource database based on criteria such as availability, skills, and location
Select the right resource based on skill set and availability, make resource assignments centrally visible, and communicate effectively with resources via an enterprise project management tool that sends task reminders through e-mail; centrally stores all resource information including assignments, usage, availability, and skills; defines custom report templates; allows for online task delegation from leads to team members or peer-to-peer as needed through a Web-based portal; and offers customizable dashboards for resource allocation and availability
Automate resource tracking via an enterprise project management tool resource center that helps managers understand the impact of assigning a resource and gain control when they level resources; uses customizable time sheets to accommodate different organizational structures and processes; publishes assignment information on enterprise portals; allows team members to enter time reports directly from their e-mail client; and uses customizable report templates to communicate resource information
Phase 3
Understand organizational capabilities across work management scenarios, make headcount and outsourcing decisions, and normalize capabilities decisions from multiple sources via integration with an enterprise project management system that loads data to and from
HR systems to perform a strategic capabilities analysis
Make smart scheduling decisions about the planning horizon based on forecasted projects and programs via a portfolio management tool that offers cost-sensitive resource allocation based on business initiatives, and consolidates all investments in a central repository to help ensure that executives gain visibility, insight, and control across the entire portfolio, as they assess the capabilities of future work
Plan demand-management scenarios and make informed decisions about outsourcing via an enterprise project management tool resource center that builds custom reports to show resource allocation, so managers can assess the resource needs of the organization
Integrated Capability Support for Priority Business Capabilities
Business Driver
Phase 1
Increase worker productivity and the consistency of deliverables via custom templates in desktop productivity tools that support project execution; and then store deliverables in centralized locations
Enable project teams to understand a basic schedule and deadlines for work assignments via a project management tool or a managed list with a project-oriented view to create project plans and communicate easily with team members and other stakeholders
Phase 2
Collectively create, find, and store project artifacts in real time via project-specific Web-based portals that have an integrated portfolio of collaboration and communication services to connect with employees information, processes, and systems; to create, collect, update, and manage relevant resources in categorized libraries; and to integrate project data into enterprise-wide search results based on common metadata to make managed work more visible
Ensure that project schedules and deadlines are enforced via an enterprise project management tool with customizable time sheets; custom report templates and project views to monitor planned vs. actual schedules and the achievement of project milestones; collaborative publishing of assignment and status information on enterprise portals, including the communication of scheduling issues; and collection of actual work effort reports through Web-based or e-mail-based forms
Phase 3
Improve cross-team collaboration via making reports and data available through Web-based dashboards and shared workflow; searching for subject matter experts across the company and partners based on expertise and roles; and using development tools that support a consistent and compliant application life cycle that enables asset reuse
Provide a single interface to enter time information, and automatically post employee work data in billing systems via integration with an enterprise project management tool that collects data from various project repositories to offer a consolidated view, and provides customizable timesheets that gather billing and project information from various data sources
Agenda
Recap Discussions to Date
•
•
•
Customize the Capability Requirements
Next Steps
Sophistication of the Solution
Solution Guidance
PHASE
DEFINITION
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Note: Physical architecture is covered in the Architecture Guide also used during the integrated capability analysis.
Recap Discussions to Date
•
• Phase 2
• Phase 3
Customize the Capability Requirements
Next Steps
Phase 1
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
ALIGN INVESTMENTS
WITH BUSINESS
STRATEGY
Define, prioritize, and communicate the actual business strategy
Consistently evaluate, rank, and rate competing investment requests
Ensure investments are properly aligned with business strategy
Communicate business strategy effectively by using diagrams, charts, and written descriptions, and then collect, update, and manage initiative requests and related information
Collect project investment requests and establish a system to rank and assess them
Prove investment worth by defending investment positioning
Report corporate effectiveness or failure
Get early performance information regarding projects
Identify and collect information about project risks and issues
MEASURE CORPORATE
PERFORMANCE
MANAGE THE COSTS
OF PROJECTS AND
PROGRAMS
OPTIMIZE RESOURCE
ALLOCATION ACROSS
THE ORGANIZATION
Use key performance indicators (KPIs) for corrective actions
Use early indicators of project performance to support decision making
Provide better visibility into and control of risk factors and issues
Predict financial performance
Gain visibility into work efforts across business units
Optimize initiatives to increase productivity with fewer resources
Build a skills inventory
Effectively allocate resources
Track resource performance
MAXIMIZE
PRODUCTIVITY OF
INDIVIDUALS
WORKING ON
PROJECTS
Share and find project artifacts
Ensure project leaders communicate clear objectives about work performance
Measure financial performance per project
Maintain a list of projects that is distributed to executives across the organization
Track organization-wide budget performance
Assess capacity vs. demand on a skill level
Assign resources as they're needed without formal processes
Track resource performance per project manually
Increase worker productivity and the consistency of deliverables
Enable project teams to understand a basic schedule and deadlines for work assignments
Phase 1
B S R D
Data Center Mgt &
Virtualization
Data Center
Services Server Security
Client
Services
Networking
Storage
Client Mgt &
Virtualization
Client Security
Identity
& Security
Services
Identity & Access
Information Protection &
Control
IT Process & Compliance
Workspaces
Portals
Collab
Social Computing
Project Mgt
Messaging
UC
IM/Presence
ECM
Enterprise
Search
Conferencing
Voice
Information Mgt
Process Efficiency
Compliance
Information Access
Interactive Experience &
Navigation
Dashboards
Reporting
& Analysis Analytics & Data Mining
Content
Creation
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Services are available during server failure (via server clustering or hot spares). IT system (hardware, hypervisor, operating system, and application)-aware monitoring and reporting on the majority of applications are in place across the heterogeneous environment, with defined service-level agreements and manual remediation functionality. Some
Production server resources are virtualized. A virtualized server pool is being offered as services (minimal Private Cloud progress). The organization actively uses virtualization to consolidate servers for production workloads.
Multiple vendor products are used for firewall, Intrusion Prevention Systems, web security, gateway anti-virus, and URL filtering. Protection for select applications (such as email) is centrally managed.
Redundant Domain Name System servers exist in a single location and provide fault tolerance. Zone creation and record updates are automatic to support directory services.
Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite.
Users back up critical data locally according to corporate policy and by using the tool provided. When it is necessary, user state can be abstracted from the operating system image (such as for a session, virtual desktop infrastructure, or roaming profile).
Protection against malicious software is centrally managed for desktop systems and laptops and includes a host firewall. Non-PC devices are managed and protected through a separate process.
Most applications and services share a common directory for authentication; some point-to-point synchronization exists across different directories, applications, and repositories. Multiple application directory services exist to support multiple standards. Password policies are set within the directory service to enable life-cycle management.
There is a centralized access policy for business resources, with some standardization in the policy. Limited, simple provisioning and de-provisioning of user accounts, mailboxes, certificates, smart cards, and machines exists to control access.
Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and email).
Each IT service provides service-level or operational-level agreements. Incident and problem management processes are in place for each IT service. IT policies are documented for each IT service. Monitoring and reporting are centralized for protection against malicious software, protection of information, and identity and access technologies.
Monitoring, reporting, and auditing are in place for IT services. Processes to manage incidents and problems are in place for each IT service.
Workspaces are managed at the departmental level and are available from individual productivity applications.
Users have widgets to customize their views of information. Enterprise search is integrated with portals. Users and groups can publish content directly to some portals. Workflow for review and approval is built-in and automated. Multiple portals exist. Directory services, authentication, and authorization are not uniform across portals, requiring users to sign in multiple times; user management methods are redundant.
Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide. Communities, if present, are largely through email or are driven by forums
Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.
IT manages mailbox provisioning by using a single directory.
Users have secure access to an enterprise-managed online presence and instant messaging infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the email client.
Managed workspaces exist at the departmental level and are available from individual productivity applications.
Custom solutions developed by IT are used to deliver and manage key forms electronically. Form data and scanned paper-based content are stored in a custom data repository.
Most unstructured information from intranets, email, and content management repositories is indexed. Some structured content from databases, people, and expertise information is indexed.
A basic interactive search experience incorporates faceted and filtered information based on common or explicit metadata.
Diagrams are linked to data and shared as static web pages or as .pdf files. Users can search for reports and related unstructured documents, and they have access to data through connections managed by IT. Users create and manage basic team or corporate scorecards that may not use cascading metrics or take a balanced scorecard approach.
Users create and share information securely through dashboards that require manual updates.
IT provides access to common or sanctioned data sources as database connections, data feeds, or reports. End users perform ad hoc queries and data analysis by using spreadsheets or other analysis tools, and by pulling data from sources sanctioned by IT in addition to other non-sanctioned sources. Information workers share their analysis through the business intelligence portal.
IT manages reporting as a standalone application or function. Data is shared from a source library to which end users can apply basic filters.
Integration: Data silos are consolidated by using basic extract, transform, and load packages to combine, integrate, and cleanse raw data from diverse data sources.
Service Architecture: Accelerated adoption, management and reuse of web services to enable greater responsiveness to changes in the business environment.
Software Quality: Active development processes use modern tools and frameworks to support object-oriented, rapid development and help manage evolving application architectures.
Phase 1
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
Networking
Storage
Client
Services
Client Mgt &
Virtualization
Identity
& Security
Services
Client Security
Identity & Access
Information Protection &
Control
IT Process & Compliance
Collab
Workspaces
Portals
Social Computing
Project Mgt
UC
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
ECM
Process Efficiency
Compliance
Enterprise
Search
Information Access
Interactive Experience &
Navigation
Dashboards
Reporting
& Analysis
Content
Creation
Analytics & Data Mining
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
PHASE
DEFINITION MAPPING
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
B S R D
Windows Server ® 2008/2008 R2; Microsoft ® Hyper-V ™ Server 2008/2008 R2; Microsoft System Center Configuration Manager 2007 R3/2012; Microsoft System Center;
Operations Manager 2007 R2/2012; Microsoft System Center Virtual Machine Manager 2008 R2/2012; Microsoft System Center Service Manager 2010/2012; Microsoft System
Center Orchestrator 2012; Opalis; Windows Azure ® Platform
Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Microsoft Forefront ® Threat Management Gateway 2010; Microsoft Internet Security and
Acceleration Server 2006; Microsoft Forefront Protection 2010 for Exchange Server; Microsoft Forefront Security for Exchange Server; Microsoft Forefront Endpoint Protection
2010/2012; Microsoft Forefront Protection 2010 for SharePoint; Microsoft Forefront Security for SharePoint; Microsoft Forefront Security for Office Communications Server
Windows Server 2008/2008 R2; Windows ® 7
Windows Server 2008/2008 R2; Windows 7; Microsoft Windows Storage Server 2008/2008 R2
Microsoft Deployment Toolkit 2008/2010; Windows Automated Installation Kit; Microsoft Diagnostics and Recovery Toolset ; Microsoft Virtual Desktop Infrastructure Suite;
Windows 7; Windows Server 2008/2008 R2; Microsoft Application Compatibility Toolkit 5.0/5.5; Microsoft Windows Server Update Services 2.0/3.0; Microsoft Desktop
Optimization Pack 2008 R2/2009 R2; System Center Configuration Manager 2007 R3/2012
Forefront Endpoint Protection 2010/2012; Windows 7; Windows Server 2008/2008 R2
Windows Server 2008/2008 R2
Windows Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server;
Forefront Security for Exchange Server; Forefront Endpoint Protection 2010/2012; Microsoft SQL Server 2008/2008 R2
Microsoft Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager
2010/2012; Hyper-V Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server
2006; Forefront Endpoint Protection 2010/2012; Windows Server 2008/2008 R2; Microsoft Security Assessment Tool; System Center Virtual Machine Manager 2008 R2/2012;
System Center Data Protection Manager 2010/2012; Opalis; System Center Orchestrator 2012
Microsoft SharePoint ® Server 2010; Microsoft Office SharePoint Server 2007; Microsoft Office 2007/2010; Microsoft SharePoint Designer 2010; Microsoft Office SharePoint
Designer 2007; Microsoft SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online
Microsoft Project 2010; Microsoft Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Microsoft Project Server 2010; Microsoft Office Project Server
2007; Microsoft Office Project Portfolio Server 2007; Office 2007/2010
Microsoft Exchange Server 2007/2010; Microsoft Outlook ® 2010; Microsoft Office Outlook 2007; Microsoft Exchange Hosted Encryption; Microsoft Exchange Hosted Archive
Microsoft Office Communications Server 2007 R2; Microsoft Lync ™ Server 2010; Microsoft Office Communicator 2007 R2; Microsoft Lync 2010; Microsoft Lync Online; Microsoft
Office Communications Online
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010
SharePoint Server 2010; Office SharePoint Server 2007; Microsoft SQL Server 2008/2008 R2; Office 2007/2010; Microsoft Visio ® 2010; Microsoft Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010
SQL Server 2008/2008 R2
Microsoft BizTalk ® Server 2009/ 2010; Microsoft Visual Studio Team System 2008/2010
Visual Studio Team System 2008/2010; Microsoft Expression ® Studio 3/4; Microsoft Silverlight ™ 4/5
Phase 1
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 1
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Recap Discussions to Date
• Phase 1
•
• Phase 3
Customize the Capability Requirements
Next Steps
Phase 2
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
ALIGN INVESTMENTS
WITH BUSINESS
STRATEGY
Define, prioritize, and communicate the actual business strategy
Consistently evaluate, rank, and rate competing investment requests
Ensure investments are properly aligned with business strategy
MEASURE CORPORATE
PERFORMANCE
MANAGE THE COSTS
OF PROJECTS AND
PROGRAMS
Use key performance indicators (KPIs) for corrective actions
Use early indicators of project performance to support decision making
Provide better visibility into and control of risk factors and issues
Predict financial performance
Gain visibility into work efforts across business units
Optimize initiatives to increase productivity with fewer resources
Collect and objectively prioritize business drivers, and then drive consensus among executives
Identify and select project investment requests by scoring that is aligned with business drivers
Select investments based on rational decisions rather than emotions
Make KPIs and underlying performance data available organization-wide
Make better decisions by standardizing work effort reporting
Identify and fix problems at a project level by using risk mitigation
Track financial performance consistently across all projects and initiatives
Eliminate duplicate work effort by making work performed and the results more visible
Select investments based on prioritized business value and budget
OPTIMIZE RESOURCE
ALLOCATION ACROSS
THE ORGANIZATION
MAXIMIZE
PRODUCTIVITY OF
INDIVIDUALS
WORKING ON
PROJECTS
Build a skills inventory
Effectively allocate resources
Track resource performance
Share and find project artifacts
Ensure project leaders communicate clear objectives about work performance
Find the right people based on matching their skills, identify optimal project start dates, and assess when to delay projects
Select the right resource based on skill set and availability, make resource assignments centrally visible, and communicate effectively with resources
Automate resource tracking
Collectively create, find, and store project artifacts in real time
Ensure that project schedules and deadlines are enforced
Phase 2
B S R D
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
Client
Services
Networking
Storage
Client Mgt &
Virtualization
Client Security
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
There are multiple levels of service availability clustering or load balancing. Virtualization and management is used to dynamically move applications and services when issues arise with datacenter compute, storage and network resources. IT system (hardware, hypervisor, operating system, and application)-aware monitoring and reporting are in place with basic remediation. There are consolidated views of all management tools and consistent reporting across heterogeneous systems. The organization has a consolidated view of and a consolidated management process for heterogeneous virtual environments, including branch offices. Majority of production server resources are virtualized. A virtualized server pool is offered as a service (Private Cloud Exists). Several Compliance and cost savings strategies leverage that Private Cloud. (Auditing and Reporting, Policy
Management, Metering Usage, Process Automation etc.).
Remote access is secure, standardized, and available to end users across the organization. Protection for all collaboration applications (such as email, document sharing, and instant messaging) is centrally managed.
Desktop applications and system events are centrally monitored for critical desktop systems. Storage of user state is centralized, including retention policies that align with corporate mandates (security and policy).
Identity
& Security
Services
Identity & Access
Information Protection &
Control
A centralized, common-access policy is defined for business resources, applications, and information resources; entitlement is managed. A centralized, scalable directory works across geographies for all intranet applications and supports authentication and authorization. A single application directory service covers multiple standards and most applications. Multi-factor and certificate-based authentication are applied in high-risk scenarios, such as remote access or document signing. The federation and trust management infrastructure is standardized for applications and systems that cross boundaries. Provisioning and de-provisioning of user and super-user accounts, certificates, and smart cards is automated; access control is role-based.
IT Process & Compliance
Workspaces
IT policies are integrated across all IT services. Monitoring and reporting are integrated with individual areas for protection against malicious software, protection of information, and identity and access technologies. Monitoring, reporting, and auditing are integrated across IT services; some capabilities exist for event investigation, analysis, and forensics.
Problem management processes are integrated across IT services. Processes to manage incidents are integrated across IT services. Service-level and operational-level agreements are integrated across IT services. Management reviews operational health regularly. Some tasks are automated.
Workspaces are centrally managed, customizable, and reusable, and provide users the ability to collaborate through web browsers and mobile devices. Offline synchronization is supported.
Line-of-business applications and data are delivered through the portal for a few broad-use functions; data is typically read only. Users get targeted information based on their profiles, their roles in the organization & mobile devices being used. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure. Governance policies are fully in place, including single sign-on supported by uniform directory services.
Collab
Portals
Social Computing
Project Mgt
UC
ECM
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
Process Efficiency
Compliance
Enterprise
Search
Information Access
Interactive Experience &
Navigation
Dashboards
Reporting
& Analysis
Analytics & Data Mining
Content
Creation
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
Task assignments, task splitting, delegation, and reporting are automated. Teams can plan against complex baselines. Project tasks and calendars are closely integrated with users’ online presence; teams can communicate with a single click; timely updates are available for accurate reporting. Collaboration happens across different mobile devices.
Portfolios are analyzed and proposals are selected based on alignment with business goals.
Traditional and new media content types are managed consistently in a single repository that has integrated workflow.
The organization uses basic workflow tools to process, review, and approve documents. Simple workflow routing is part of the collaborative workspace infrastructure.
Content is stored in a well-managed repository and disposition rules are appropriately applied. Content can be rapidly identified and preserved. Business relies heavily on outsourcing for review and processing of evidence.
Unstructured content from the web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed. Indexing processes incorporate browsing by people and ranking of expertise.
An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.
Diagrams are dynamically linked to data and shared using a web browser. Diagrams display real-time data from one or more sources; data can be refreshed automatically at specific intervals. Users create and manage personal or team dashboards and scorecards based on a balanced scorecard methodology that includes dynamic and cascading updates.
Data mining analysts use statistical and data mining software to analyze business data and build models to enable future decisions, predict trends, and find correlations in business attributes using a limited set of data mining algorithms and limited data volumes. End users can perform sophisticated analyses and build feature-rich business intelligence applications by using spreadsheet or other analysis tools.
End users subscribe to reports, but targeted subscription capabilities such as time stamps are limited or non-existent. User specify the device or format in which to receive reports (for example, inbox or email, phone, or Short Message Service text). IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source content, change the display, sort, apply filters, and customize reports after they are generated.
Design and Management: Formal data management and administration tasks related to installation, configuration, management, and maintenance of databases, user accounts, database availability, recovery, and reporting.
Enterprise Application Integration: Access to business services and information is aggregated into a set of dynamic, composite business applications, to gain more accurate and more comprehensive information.
User Experience: Investment in next-generation development tools occurs, which provide tight integration of various development tasks and offer the highest quality rich-user experience on multiple devices.
Phase 2
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
PHASE
DEFINITION MAPPING
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
B S R D
Windows Server 2008/2008 R2; Hyper-V Server 2008/2008 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System
Center Virtual Machine Manager 2008 R2/2012; System Center Service Manger 2010/2012; Opalis; Windows Azure ® platform; System Center Orchestrator 2012
Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006;
Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Microsoft Forefront Protection 2010 for SharePoint; Microsoft Forefront Security for
SharePoint; Microsoft Forefront Security for Office Communications Server; Forefront Endpoint Protection 2010/2012; Microsoft Forefront Unified Access Gateway 2010;
Microsoft Intelligent Application Gateway 2007
Networking
Storage
Client
Services
Client Mgt &
Virtualization
Deployment Toolkit 2008/2010; Windows User State Migration Tool 3.0/4.0; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Microsoft Application
Virtualization 4.5/4.6; Microsoft Enterprise Desktop Virtualization; Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update
Services 2.0/3.0; Desktop Optimization Pack 2008 R2/2009 R2; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System
Center Service Manager 2010/2012; Exchange Server 2007/2010; Windows Phone 7; Windows Mobile ® 6.1/6.5; Forefront Endpoint Protection 2010/2012; Windows Automated
Installation Kit; Microsoft System Center Mobile Device Manager 2008
Identity
& Security
Services
Client Security
Identity & Access
Information Protection &
Control
Microsoft Forefront Identity Manager 2010; Microsoft Identity Lifecycle Manager 2007 Windows Server 2008/2008 R2; Windows 7; Hyper-V Server 2008/2008 R2
IT Process & Compliance
Operations Framework 4.0; System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager
2010/2012; Hyper-V Server 2008/2008 R2; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Endpoint Protection
2010/2012; Windows Server 2008/2008 R2; Opalis; System Center Virtual Machine Manager 2008 R2/2012; System Center Data Protection Manager 2010/2012; System Center
Orchestrator 2012; Microsoft Security Assessment Tool
SharePoint Server 2010; Office SharePoint Server 2007; Office 2010 (including Microsoft SharePoint Workspace 2010); Office 2007; SharePoint Designer 2010; Office SharePoint
Designer 2007; Microsoft Office Groove ® 2007; SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online
Workspaces
Collab
Portals
Social Computing
Project Mgt
UC
ECM
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
Process Efficiency
Compliance
Enterprise
Search
Information Access
Interactive Experience &
Navigation
Dashboards
Reporting
& Analysis
Content
Creation
Analytics & Data Mining
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
Project Server 2010; Office Project Server 2007; Project 2010; Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Office Project
Portfolio Server 2007
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; Microsoft FAST ™ Search Server 2010 for SharePoint; Office 2007/2010
SharePoint Server 2010; Office SharePoint Server 2007; FAST Search Server 2010 for SharePoint; Windows 7
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Visio 2010; Office Visio 2007; Office 2007/2010
SQL Server 2008/2008 R2
BizTalk Server 2009/ 2010; Visual Studio Team System 2008/2010
Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5
Phase 2
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 2
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Recap Discussions to Date
• Phase 1
• Phase 2
•
Customize the Capability Requirements
Next Steps
Phase 3
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
ALIGN INVESTMENTS
WITH BUSINESS
STRATEGY
Define, prioritize, and communicate the actual business strategy
Consistently evaluate, rank, and rate competing investment requests
Ensure investments are properly aligned with business strategy
MEASURE CORPORATE
PERFORMANCE
MANAGE THE COSTS
OF PROJECTS AND
PROGRAMS
Use key performance indicators (KPIs) for corrective actions
Use early indicators of project performance to support decision making
Provide better visibility into and control of risk factors and issues
Predict financial performance
Gain visibility into work efforts across business units
Optimize initiatives to increase productivity with fewer resources
OPTIMIZE RESOURCE
ALLOCATION ACROSS
THE ORGANIZATION
Build a skills inventory
Effectively allocate resources
Track resource performance
MAXIMIZE
PRODUCTIVITY OF
INDIVIDUALS
WORKING ON
PROJECTS
Share and find project artifacts
Ensure project leaders communicate clear objectives about work performance
Provide organizational control and action according to business strategy
Enable a rationalized approach to choose which investments have the highest return and alignment to business strategy
Enhance the business value of the portfolio, to ensure that the mix of investments aligns to established business strategy
Automate action on trends, alerts, and performance
Transmit work effort to LOB and financial systems, pull metrics from financial systems, and combine the results in a comprehensive corporate reporting portal
Build tools to support a comprehensive risk management program
Ensure that project financial data automatically flows into and from financial systems
Reduce effort on low-value projects and programs
Plan demand-management scenarios and make informed decisions about outsourcing
Understand organizational capabilities across work management scenarios, make headcount and outsourcing decisions, and normalize capabilities decisions from multiple sources
Make smart scheduling decisions about the planning horizon based on forecasted projects and programs
Plan demand-management scenarios and make informed decisions about outsourcing
Improve cross-team collaboration
Provide a single interface to enter time information, and automatically post employee work data in billing systems
Phase 3
B S R D
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
Networking
Storage
Client
Services
Client Mgt &
Virtualization
Client Security
Identity
& Security
Services
Identity & Access
Information Protection &
Control
IT Process & Compliance
Workspaces
Portals
Collab
Social Computing
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Secure remote access is integrated with quarantine for compliance with corporate policy. Integrated perimeter firewall, Intrusion Prevention Systems, web security, gateway antivirus, and URL filtering are deployed with support for server and domain isolation.
Automatic server cleanup uses scavenging. Redundant Domain Name System servers exist in multiple locations and provide fault tolerance.
Critical data is backed up by taking snapshots using a centralized, application-aware system. Backup copies are stored separately at a physical location or by using a cloud-based service, with fully tested recovery or failover based on service-level agreements.
Desktop applications and system events are centrally monitored and reported, and trends are analyzed and integrated into incident management systems. A solution is in place to configure and update devices. All mobile access to internal systems is proxied through the messaging system. Mobile devices are managed by security policy provisioning
(such as personal identification numbers) and remote deletion. Mobile phones are used for over-the-air synchronization with email, calendar, and contacts. Mobile service configuration is automated and occurs over the air.
Protection against malicious software is centrally managed for desktop systems, laptops, and non-PC devices. Desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.
Persistent information protection helps to enforce policy on sensitive data across the enterprise, including data on mobile devices. Policy templates are used to standardize rights and control access to information.
Line-of-business applications are routinely surfaced through the portal and have the ability to write securely to back-end systems and to maintain data integrity. Information from multiple applications can be combined in dashboards.
Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs. This Content is accessible through multiple mobile devices.
Project and program portfolios are selected by using optimized algorithms. Teams routinely use frontier analyses, sensitivity analyses, business alignment assessments, and decision dashboards.
Project Mgt
UC
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
ECM
Enterprise
Search
Process Efficiency
Compliance
Information Access
Interactive Experience &
Navigation
Dashboards
People can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time.
Reporting
& Analysis
Analytics & Data Mining
Users can search for unstructured documents and structured reports based on metadata and report content. IT manages data connections for users. Users also can connect to external data sources and combine them in a single report.
IT provisions the business intelligence portal infrastructure with advanced business intelligence capabilities that include search, dashboards, scorecards, alerts, social interaction, browser-based thin-client experience, exception highlighting, guided and predictive analysis, and advanced visualization. The workbench enables data preparation, cleansing, multivariate analysis, and a sophisticated set of data mining algorithms and tuning options (including additional extensibility options such as custom algorithms) to support data mining across huge data volumes.
Content
Creation
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Design and Management: Enterprise-wide standards and practices for discrete areas such as physical storage and capacity planning, performance and tuning, data integrity, and security.
Human Workflow: Business stakeholders can design, interact with, monitor, innovate, and automate critical business processes in a more defined, monitored, and reportable manner using workflows.
Software Quality: Adaptive methodologies and emergent design approaches are used to facilitate integrating a design with the development process.
Development Dependencies
Phase 3
B S R D
Data Center Mgt &
Virtualization
Data Center
Services
Server Security
Networking
Storage
PHASE
DEFINITION MAPPING
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Windows Server 2008/2008 R2 (Windows Firewall with Advanced Security); Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006;
Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for SharePoint; Forefront
Security for Office Communications Server; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007
Windows Server 2008/2008 R2; Windows 7; Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Windows Server AppFabric (Caching);
System Center Operations Manager 2007 R2/2012
Windows Server 2008/2008 R2; Windows 7; Windows Storage Server 2008/2008 R2; System Center Service Manager 2010/2012; System Center Virtual Machine Manager 2008
R2/2012; System Center Data Protection Manager 2010/2012
Deployment Toolkit 2008/2010; Diagnostics and Recovery Toolset; Virtual Desktop Infrastructure Suite; Application Virtualization 4.5/4.6; Enterprise Desktop Virtualization;
Windows 7; Windows Server 2008/2008 R2; Application Compatibility Toolkit 5.0/5.5; Windows Server Update Services 2.0/3.0; Desktop Optimization Pack 2008 R2/2009 R2;
System Center Configuration Manager 2007 R3/2012; System Center Operations Manager 2007 R2/2012; System Center Service Manager 2010/2012; System Center Mobile
Device Manager 2008; Exchange Server 2007/2010; Windows Phone 7; Windows Mobile 6.1/6.5; Forefront Endpoint Protection 2010/2012; Windows Embedded Device
Manager 2011; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Windows User State Migration Tool 3.0/4.0
Forefront Endpoint Protection 2010/2012; Windows 7; Windows Server 2008/2008 R2; Windows Phone 7; Windows Mobile 6.1/6.5; Forefront Threat Management Gateway
2010; Internet Security and Acceleration Server 2006
Client
Services
Client Mgt &
Virtualization
Client Security
Identity & Access
Identity
& Security
Services
Information Protection &
Control
IT Process & Compliance
Collab
Workspaces
Portals
Social Computing
Project Mgt
UC
ECM
Enterprise
Search
Reporting
& Analysis
Content
Creation
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
Process Efficiency
Compliance
Information Access
Interactive Experience &
Navigation
Dashboards
Analytics & Data Mining
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
Database Dependencies
Integration Dependencies
Development Dependencies
Windows Server 2008/2008 R2; Forefront Endpoint Protection 2010/2012; Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Forefront Threat
Management Gateway 2010; Internet Security and Acceleration Server 2006; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; System
Center Operations Manager 2007 R2/2012; SQL Server 2008/2008 R2
SharePoint Server 2010; Office SharePoint Server 2007; SharePoint Designer 2010; Office SharePoint Designer 2007; Office 2007/2010; SharePoint Online
SharePoint Online; Office 2007/2010; SharePoint Server 2010; Office SharePoint Server 2007
Project Server 2010; Office Project Server 2007; Project 2010; Office Project 2007; SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Office Project
Portfolio Server 2007
SharePoint Server 2010; Office SharePoint Server 2007; Office 2007/2010; Visio 2010; SharePoint Designer 2010; Office SharePoint Designer 2007; SharePoint Online
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SharePoint Server 2010; Office SharePoint Server 2007; SQL Server 2008/2008 R2; Office 2007/2010; Visio 2010; Office Visio 2007
SQL Server 2008/2008 R2
BizTalk Server 2009/2010; Visual Studio Team System 2008/2010
Visual Studio Team System 2008/2010; Expression Studio 3/4; Silverlight 4/5
Phase 3
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Phase 3
PHASE
DEFINITION MAPPING TECHNOLOGIES
CONCEPTUAL
ARCHITECTURE
LOGICAL
ARCHITECTURE
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Next Steps
Example Solution Area: Phase 2
Data Center Mgt &
Virtualization
Server Security
Networking
B S
R D
A defined set of core standard images exists. There is a defined, end-to-end server deployment process that includes application compatibility testing.
Protection for select applications (such as e-mail) is centrally managed. Remote access is secure, standardized, and available to end users across the organization.
Zone creation and record updates are automatic to support directory services. Dynamic Host Configuration Protocol servers are aware of sub-networks.
Storage
Client Mgt &
Virtualization
Client Security
Storage is managed on server clusters or shared storage arrays. Transparent failover occurs if a storage node fails, with no interruption in availability.
The majority of the installed client base has a combination of current and recently released operating systems. A centralized store of user profiles supports the ability to apply policies.
All users are deployed as standard users, and users who require administrative access are given secondary accounts. Users are restricted from running applications that are considered harmful to the environment. Disk-level encryption is in place across all desktop systems and laptops.
Federation and trust are set manually per instance for select applications or systems across boundaries. Password policies are set within the directory service to enable lifecycle management.
Identity & Access ?
Information Protection &
Control
IT Process
& Compliance
?
Workspaces
Portals
Social Computing
Project Mgt
Messaging
IM/Presence
Conferencing
Voice
Information Mgt
Process Efficiency
Compliance
?
?
Data classification is contextual at select points and for select protocols in the network, and complements classification by end users. Data classification is both contextual and driven by end-users as data is created and used.
Individual business units align with the IT service portfolio. IT service costs, returns, capacity, availability, continuity, and integrity are reported. IT policies are documented for each IT service.
Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices. Offline synchronization is supported. Team members can simultaneously author, edit, and review content.
Publishers can direct content to specific audience targets. Portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity and role. Users get targeted information based on their profiles and roles in the organization.
Blogs, wikis, and podcasts are used occasionally, but may not be encouraged enterprise-wide. Communities, if present, are largely through e-mail or are driven by forums.
Social feedback is generally limited to comments in e-mail, forums, or within individual documents.
Teams plan, track, and share tasks in lists by using collaboration tools. Multiple baselines exist. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.
The e-mail platform supports message encryption (S/MIME) to enable digital signatures. IT manages mailbox provisioning by using a single directory.
Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall. Peer-to-peer voice and video communications are based on a single directory. Multiple-party IM is managed by the enterprise.
A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications. The platform also has a single user interface, a single directory, and is available across organizational boundaries.
Call routing within an organization is based on identity and online presence. Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.
Metadata includes social tags. Search indexing automates promotion of metadata to business applications and processes. Web content is dynamically presented to visitors based on real-time behavior analysis. Web sites are integrated with line-of-business systems to manage and deliver content in both locations.
All data from forms is captured and validated electronically. Paper-based content is scanned and key data is extracted by using character-recognition technology. Business processes are automated by using workflows and visual design tools.
Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail. Reporting occurs manually. Content is stored in a well-managed repository and disposition rules are appropriately applied.
Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed. Indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience.
Information Access
Interactive Experience &
Navigation
Dashboards
Analytics & Data Mining
Report Generation &
Distribution
Authoring
Multi-Device Support
User Accessibility
Interoperability
There is a single way to access all information, structured or unstructured, across the organization. Search-driven portals and applications provide content targets based on user context and interests.
Users can search for reports and related unstructured documents, and they have access to data through connections managed by IT. Diagrams are linked to data and shared as static Web pages or in PDF.
In addition to the IT-provisioned infrastructure for data mining activities, support by data mining analysts, and self-service capabilities for end users, is a powerful data mining workbench.
IT manages reporting components and shared data sets to provide a highly interactive library and reporting environment in which end users can modify or edit source content, change the display, sort, apply filters, and customize reports after they’re generated.
Content is efficiently reused without loss of context across applications that have different purposes. Templates are centrally manageable. Ideas, notes, and research gathered across Web productivity tools and conversations are easy to find and share.
Application user interfaces are customizable at the user and organizational levels for optimal flexibility in user experience and IT control. Documents can be viewed and edited through optimized modes (such as PC, phone, or browser) without significant formatting or data loss.
A broad ecosystem of third-party extensions further reduces usability challenges for people who require various accessibility accommodations. Solutions are developed to support process-led checks of user-created content and sites before publication
Content is actively exchanged with and transformed by line-of-business systems through extensible markup language (XML)-based formats.
Keep a capability if you are unsure whether you need it
Server Security helps protect and secure the server infrastructure at the data center from viruses, spam, malware, and other intrusions.
Networking helps manage the network and related configurations to ensure optimal utilization of network resources and business continuity.
Recap Discussions to Date
Solution Guidance
• Phase 1
• Phase 2
• Phase 3
Customize the Capability Requirements
Engagement Approach
Audience
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,
IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.