DHS Enterprise Architecture. The Open Group Conference Boundaryless Information Flow October 20, 2003

Similar documents
Work Product Dependency Diagram

Grid-Interop Smart Grid Architecture Evolutions. December 2, 2010

Enterprise Architecture Development

Administering System Center Configuration Manager and Intune (NI114) 40 Hours

Information Sharing Environment Interoperability Framework (I 2 F)

Federal Enterprise Architecture

Administering System Center Configuration Manager and Intune (20696C)

Architecting an On Demand Enterprise with the Federal Enterprise Architecture (FEA) Andras R. Szakal Chief Architect, IBM Federal Software, S&D

Software Systems Technology Conference

How SOA Can Help EA. Enterprise Architecture Conference 2008

Harmonising two conceptual frameworks for EA

Working Towards Lightweight Enterprise Architectures: the Process, frameworks, standards, and models

TOGAF 9.1 in Pictures

TOGAF 9 Training: Foundation

ICT budget and staffing trends in Germany

Services Guide April The following is a description of the services offered by PriorIT Consulting, LLC.

Avancier Methods (AM) Applications architecture diagrams

TOGAF Foundation. Part I: Basic Concepts 1 /

TOGAF 9.1 Phases E-H & Requirements Management

Operational Logistics On Demand

ArcGIS for Emergency Management 1:00 2:15pm

SERVICE ORIENTED ARCHITECTURE SOA INTRODUCTION

How to manage data integration within Microsoft Dynamics efficiently:

Overview and Frequently Asked Questions

Edison SmartConnect. The Role of IT in. John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008

Cisco Enterprise Mobility Services Platform (EMSP)

Ingraining Technology Into Strategic Planning- Strategic IT Planning. CAST Strategic Planning & Strategic IT Planning Workbook 4/25/2018

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

SAP NetWeaver Service Select for Master Data Management. Tuesday October 26 th 2004

<Insert Picture Here> Hardware And Software Engineered To Work Together

Oracle Cloud Blueprint and Roadmap Service. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise Information Architecture. Connected Government. Author name is hidden

ADM Content: Result of Applying Methodology

Administering Microsoft System Center Configuration Manager and Cloud Services Integration (beta) (703)

System Implementation. James Tedrick, Esri

The USDA Enterprise Architecture Program

Technology Roadmap Status

"Charting the Course... MOC C Administering System Center Configuration Manager and Intune. Course Summary

ICT procurement trends in the Netherlands

Enterprise Computing. Paul Padley SAS Institute. Adaptive Architectures for Business Intelligence - managing the deployment cost curve

Data Warehousing provides easy access

Goal 1: CONTINUED DEVELOPMENT OF ADVANCED TECHNICAL SERVICES

can boost global IoT success

OSS ENTERPRISE E-PRODUCUREMENT MANANGEMENT SYSTEM (ASP.NET) Version: ASP.NET (3) Updated: 4Q/2007, v:g/1 Reference: Core Application 0103/88

Security & Defense Solutions

The Benefits of Running JD Edwards EnterpriseOne on the Oracle Technology Stack. A.J. Schifano Principal Product Manager Oracle

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and

JOURNAL OF OBJECT TECHNOLOGY

TOGAF - The - The Continuing Story Story

CIM Forum Charter Dated

An Introduction to Oracle Identity Management. An Oracle White Paper June 2008

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1

Architecture Modeling Approach for Net-Centric Enterprise Services

Oracle Application Integration Architecture

Oracle Application Integration Architecture

Project Management and Governance Policies - Need for Enterprise Information Management. Terry Saxton Xtensible Solutions

An introduction to the Optimised Microsoft Desktop. Windows Client Microsoft

Enterprise Architecture May 2015 Executive Committee. May 20, 2015 Wednesday 1:00-2:00 p.m. 561 Smith Center

Service Oriented Architecture. Reference MIDDLEWARE & ENTERPRISE INTEGRATION TECHNOLOGIES By

The Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council

Enterprise Technology And Solutions by ESRI. Dave Wrazien Solution Architect ESRI, Inc.

On demand operating environment solutions To support your IT objectives Transforming your business to on demand.

IBM. Hardware IBM System p IBM System i IBM System x IBM System z IBM System Storage and TotalStorage

CHAPTER 3 ENTERPRISE SYSTEMS ARCHITECTURE

Service Oriented Architecture

A business-back approach to technology consumption

How to Choose a Managed Services Provider

Information & Technology 2015 OPERATING BUDGET OVERVIEW

Statewide POLICY P700 Rev 2.0

Revision Summary Document for the FEA Consolidated Reference Model Version 2.3

Industrial Connected Product Solutions

COURSE OUTLINE: Implementing a Data Warehouse with SQL Server Implementing a Data Warehouse with SQL Server 2014

Turn your conversations into memorable conversations by learning how to showcase Dynamics CRM Online value proposition to Technical Decision Makers.

Science & Technology Directorate

SOA Success Methodology

Implementing a Data Warehouse with Microsoft SQL Server

WCO ICT Conference Developing IT Project Proposals A Strategic Perspective

The Road to Shared IT Services. John Gohsman, Vice Chancellor and CIO

APPENDIX O CONTRACTOR ROLES, RESPONSIBILITIES AND MINIMUM QUALIFICATIONS

WE RE IN THIS TOGETHER

The SAM Optimization Model. Control. Optimize. Grow SAM SOFTWARE ASSET MANAGEMENT

Deployment of MBSE processes using SysML

Accenture Federal Services. US Department of Homeland Security: At a Tipping Point Agile Solutions or Aging Infrastructure?

Emerging Patterns for Implementing the ArcGIS Platform. Marten Hogeweg Peter Bottenberg

Enterprise Management Frameworks & TOGAF 9

Installation and Configuration for Microsoft Dynamics AX 2012

Tracking Payments and Securities with IBM Financial Transaction Manager V2 IBM Redbooks Solution Guide

Davis Technical College Technology Plan

Systems Management of the SAS 9.2 Enterprise Business Intelligence Environment Gary T. Ciampa, SAS Institute Inc., Cary, NC

SCHEDULE 20 SERVICE DOCUMENTATION

AGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY

AF AIT PMO s Mission

SERVICE ORIENTED ARCHITECTURE (SOA)

Federal Segment Architecture Methodology Overview

Success Story. OTRS Business Solution guarantees high availability of reliable customer service worldwide for SES Techcom Services.

Enhancing. PeopleSoft Applications With Oracle Fusion Middleware

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1

Understanding the relationship between Asset Management and the CMDB

AGENDA. Asset Trail Active Tracking solution

Transcription:

DHS Enterprise Architecture The Open Group Conference Boundaryless Information Flow October 20, 2003

Our EA Challenge Support the FY05 budget formulation process Develop high-level, conceptual Homeland Security EA Develop a realistic, actionable Transition Strategy Interact with DHS business units Incorporate State and Local perspectives As-Is Baseline inventory of technology resources and business processes Transition Plan How to move the Enterprise toward the evolving To-Be state To-Be Architecture Business Data Application Technology 10/20/2003 1:01 PM Pg. 2

Results of the EA Project Version 1.0 Statistics Length: 4 Months May 2003 through Sept 2003 Cost: $1.2M People/Groups involved: CIO s office Applied Technology Board; EA Team DHS Architecture Working Group Directorates Represented: S&T, IAIP, CBP, ICE, EP&R, TSA, FLETC Organizational Elements Represented: USSS, USCG; BCIS Mitre Financial / Resource Business Model Activities: 80 Workplace Types: 15 Work Zones: 4 Target Enterprise Architecture Data Subject Areas: 17 Data Objects: 47 Application Applications: 25 Reusable Components: 66 Technology Technology Patterns: 12 Technical Reference Model Technology Categories: 60 Transition Strategy Conceptual Projects: 28 10/20/2003 1:01 PM Pg. 3

Business Architecture Identify threats to and vulnerabilities of the Homeland Facilitate the Flow of People and Goods Collaborate/ coordinate w/federal, State, Local Governments, and Private Sector Prevent incidents Value Chain Disseminate Information Prepare for incidents Develop Plans and Performance Measures Manage Knowledge and Intelligence Information Perform Research and Development Develop Policy Respond to incident Manage Human Resources Manage Technology Manage Grants, Procurements, and Acquisitions Manage Legal Activities Manage Facilities and Property Manage Budget & Finances Identify HLS Technology Candidate Solutions Evaluate HLS- Related Technology Research Results Recover from incident Secure the Homeland, its People, Assets, and Interests Value Stream Conduct Demonstrations and Pilot Deployments Manage Knowledge and Intelligence Information Perform Research and Development Perform Research and Development Perform Research and Development Deploy HLS-specific Advanced Technologies Business Model HLS005 HLS059 HLS061 HLS062 Collaborate/coordinate w/federal, State, Local Governments, and Private Sector Identify HLS Technology Candidate Solutions Evaluate HLS-Related Technology Research Results Conduct Demonstrations and Pilot Deployments Perform Research and HLS063 Deploy HLS-specific Advanced Development Technologies Develop Policy HLS111 Set Homeland Security Standards Manage Grants, Procurements, and Acquisitions Manage Grants, Procurements, and Acquisitions Manage Grants, Procurements, and Acquisitions Manage Grants, Procurements, and Acquisitions Manage Grants, Procurements, and Acquisitions Manage Grants, Procurements, and Acquisitions HLS082 HLS083 HLS084 HLS085 HLS086 HLS112 Administer Agreements and Contracts Certify Acceptance Determine Purchase Sources / Methods Establish Acquisition Vehicle to Procure Goods / Services Develop Acquisition Requirements Administer Grants Perform Research & Development 10/20/2003 1:01 PM Pg. 4

Target Architecture Data Architecture Communication Correspondence Outreach Content Warning Conveyances Conveyance Agreement Contract Grant MOU Party Organization Person Risk Threat Vulnerability Weapon Case Case Technology Applied Technology Information Technology Financial Resource Account Appropriated Fund Budget Non-Appropriated Fund Asset Capital Asset Critical Infrastructure Custodial Property Emergency Response Stockpile Incident Response Materials and Equipment Key Asset Law Enforcement Asset (Weapon) Operational Materials and Equipment Record Goods Cargo Training Resource Training Exercise Training Material Governance Credential Mandate Employment Employment Entitlement Position Skill Location Physical Location Virtual Location Plan Goal/Objective Performance Measure Plan Event Incident Occurrence Benefit Commercial Benefit Immigration Benefit Medical Benefit Relief Benefit 10/20/2003 1:01 PM Pg. 5

Target Architecture Application and Component Architecture CURE Matrix User Classes Domain Specific Components Domain Independent Components ID APP001 APP014 APP023 APP015 APP007 COMP044 COMP011 COMP009 COMP043 COMP012 COMP004 COMP008 COMP015 Application List Application Business Applications Homeland Security Collaboration Zone Application Planning and Performance Application Research and Development Administration Application Contract and Acquistion Application Grants Application Domain Specific Components Mandate Administration Contract Administration Compliance Domain Independent Components Risk Correspondence Application Processing Case Manaegment Decision Support Components A self contained business process or service with predetermined functionality that may be exposed through a business or technology interface are independently deployable software units that integrate easily to compose larger systems-applications may contain multiple implementations to support many technology platforms Applications are enablers of business workflows within the enterprise are structured of smaller independent functional parts called components components are assembled to achieve overall application functionality 10/20/2003 1:01 PM Pg. 6

Target Architecture Technical Architecture Patterns, Model, and Profiles N-Tier Dynamic Web Application Architecture Pervasive Device Support Portal - Personalization - Content Workflow / Business Process Broker - Decomposition - Router - Agent Business Rules Engine Integration and Interoperability - Web Services - Message Oriented Middleware Business Intelligence / Data Warehouse - Pattern Matching Data Access - Asynchronous Access Collaboration Security Performance and Reliability Desktop Interface Software Terminal Emulators Pervasive Device interfaces Narrow Band Wireless Access CRM/Helpdesk Client Presentation Layer Office Suite Business Logic Business Intelligence Components Mission Specific Application Components Web Portal GIS Server Web Servers and Plug-ins Application CRM/Helpdesk Server Search Engines Infrastructure Application Server Transaction Processing Server Mail Server Collaboration Server Enterprise Application Integration Integration Services Inter-application Messaging Services Web Services Enterprise Reporting Tools Data Data Access Services Data Transformation Services Telephony Computing NOS Platform Shared Special Purpose Hardware End User Special Purpose Hardware GIS Client Web Clients Collaboration Client Office Suite Document CRM Agent Workflow Server Rules Engine Metadata Services DBMS Structured Computer Hardware Enterprise Storage Operating System Directory Services Network Narrowband Wireless Remote Access Communications LAN Broadband Wireless WAN Access Control Cryptography Security Operation Network Security Applications and System Security Physical Security M a n a g e m e n t a n d O p e r a t i o n s Program Tools Development Tools SA Tools Network Admin Tools Operations Tools Release Tools Content S e c u r i t y 10/20/2003 1:01 PM Pg. 7

The Virtual Application Mary Jane is a Special Events Planner Mary Jane s View Physical Security Investigations Public Relations 10/20/2003 1:01 PM Pg. 8

Information Sharing Architecture DHS Internal Space DHS Shared Space Local Directory Private Servers Workstations LAN F I R E W A L L Organizational Shared Data Organizational Shared Applications F I R E W A L L Community Space Data Conversion Full Service Directory Collaboration Webmail Storage Common Applications 10/20/2003 1:01 PM Pg. 9

Transition Strategy Proposed Sequence Conceptual projects and associated capabilities are enabled over time Each conceptual project aligns to objectives Each conceptual project is sequenced based on its alignment to objectives The detailed sequence strategy displays all sub-projects required by the conceptual project 2+ years <2years <1year <6 months Conceptual projects provide target capabilities and include other non-technology projects focused on business process and organizational improvements Unify Infrastructure Sequencing Diagram Global View Address Immediate / Critical Mission Needs Optimize (Deliver New Capabilities) Stabilize Rationalize Address Legislatively Required Project Dates Conceptual Projects Rationalize/ Optimize Corporate Solutions Provide New/ Improved Mission Capabilities Chart Displays, at a High-level, the Sequence of the types of Conceptual Projects As Shown on the Detailed Sequence Diagram 10/20/2003 1:01 PM Pg. 10

Transition Strategy The Transition Strategy is: The first step in developing a detailed transition plan A means to implement and realize benefits from implementing the HLS target architecture A vehicle for sharing information with state, local, and federal agencies Developed by: Assessing and evaluating the current state of information technology Understanding HLS target architecture requirements Developing conceptual projects to drive to the target The Approach: Is principle based, developed according to a structured approach Addresses key challenges Is benefit focused Consists of: Key conceptual projects Potential sequencing of key conceptual projects Potential benefits and milestones timeline 10/20/2003 1:01 PM Pg. 11

Summary DHS EA Products Business Model Business Value Chain EA Values and Principles Hierarchical Business Model List of Activities User Classes Business Scenarios Business Model to Federal Reference Model Mapping High-Level DHS CONOPS Operational Sequence Diagrams Target EA Conceptual Data Model Subject Area Definitions Data Object Definitions and Characteristics Subject Area Relationship Diagram CURE Matrix Application and Component Architecture Application and Component Descriptions Applications and Components to Business Activities Mappings Applications and Components to SRM Mappings Application and Component Diagrams Technical Architecture Technology Patterns Technology Patterns to Applications & Service/Components Mapping Geo-Technical Architecture Diagram Enhanced TRM Standards Profile Transition Strategy Transition Strategy Briefing Transition Sequence Diagram Transition Strategy Supporting Materials Quick Hits Conceptual Project Details Conceptual Project Mappings GAO Information Sharing Summary Risk Mitigation Strategy Governance Strategy White Paper 10/20/2003 1:01 PM Pg. 12