it strategy - v4
TRANSCRIPT
-
7/23/2019 IT Strategy - V4
1/13
Crescent Bahuman Ltd
CBL BUSINESSAPPLICATIONS&
INFRASTRUCTURE
GAP ANALYSIS
-
7/23/2019 IT Strategy - V4
2/13
1. SUMMARYThe ICT Business Applications (BiApps! & In"#ast#uctu#e St#ate$% is c#itical in
achiein$ CBL 'usiness ision an in settin$ the p#o)ects an p#io#ities "o# ICT
epa#t*ent+
Goals "o# 'usiness applications, in"#ast#uctu#e an #esou#ces a#e-
.eetin$ cu##ent an "utu#e se#ice nees
Ealuate an aopt leain$ technolo$ies
Anal%e an eelop actiona'le 'usiness /PIs & Sco#eca#s
Objectives to accomplish the oals are!
Secu#e, #elia'le, 0e1i'le solutions
Suppo#t 'usiness continuit%
P#o)ect elie#% '% a #o'ust an cont#olle app#oach
2i$h accessi'ilit% an en)o%a'le use# e1pe#ience Co*pliance 3ith CBL o'li$ations
". #$%RO&UC%#O$
".1. 'urposeThe St#ate$% is a 'usiness technolo$% ena'le*ent "#a*e3o#4 to suppo#t CBL
ision "#o* an in"#ast#uctu#e, 'usiness s%ste*s, suppo#t, an se#ice
pe#spectie+
The St#ate$% is #ien '% a nee to suppo#t cu##ent 'usiness scena#ios an
#euce applications *aintenance cost, #eunant ata 3astes an to aaillatest technolo$% eelop*ents+
".". Bac(roundThe#e hae 'een continuous an #api chan$es in the technolo$% an
applications lanscape an CBL nee to *oe#nie its 'ase to *a4e "ull use
o" it+ Follo3in$ a#e the 4e% "ocus a#eas5
Business Applications Oe#haul
6ata Ac7uisition S%ste*
.o'ilit% Accessi'ilit%
Consoliation o" In"o#*ation Secu#it% .ana$e*ent
In"#ast#uctu#e Uni8cation
IT Goe#nance & co*pliance
6ata cente#
Sto#a$e
Use# T#ainin$s
2elpes4
IT ena'le*ent
-
7/23/2019 IT Strategy - V4
3/13
). Strate* &evelopment Methodolo*The oe#all St#ate$% eelop*ent p#ocess inco#po#ates CBL technolo$% an
'usiness #e7ui#e*ents, $ap anal%sis an list o" pain a#eas+ Lessons lea#ne
an a #ealistic anal%sis o" cu##ent state is 4e% *oe "o#3a# i#ecties+
).1. Current State
9e hae une#ta4en a co*p#ehensie assess*ent o" the cu##ent state o"technolo$% incluin$ in"#ast#uctu#e, applications an s4ills+ Follo3in$ is the
sco#e:ca# *at#i1 o" st#en$ths an 3ee4 points+
-
7/23/2019 IT Strategy - V4
4/13
+a, Business Applications
Score "- /0 "
Strenths
Strate* 2lements
6o*ain
/no3le($e
Technolo$%
Functionalit%
Specialiation
Ope#ationalRepo#tin$
Usa$e
Business
;alueA((ition
Co#e Business
S%ste*s- ERP
OF
.a1i*o
RFI6
BI
-
7/23/2019 IT Strategy - V4
5/13
RFI6
BI
-
7/23/2019 IT Strategy - V4
6/13
6atacente#
2elp es4
Sto#a$e
In"#ast#uctu#e
Su#eillance
-
7/23/2019 IT Strategy - V4
7/13
).". Operations status
Resou#ce Brnds5 6rsns17)*rs
70*rs
879*rs
1-:Yrs
6es4top NB, Us 6ell =>? =@ =>? @
Se#e#s
2P, IB., 6ell,
NB = > D =
Se#e# OS 3in"--- 3in"--) Ln;
Se#e#s = =
OceApplications O
P#ocesso# i) ' =eon #tanium
Se#e#s @ >
Sto#a$e Se#e#, NAS D t'
Licensin$Srvr OS Srvr &B
&s(tpOS
AppsClnts
O?Aplctn A6
= = = >
-
7/23/2019 IT Strategy - V4
8/13
).). @ap Anal*sis
a, Business Applications
Gap Anal%sis is in t3o cate$o#ies, co*pletel% *issin$ "unctionalit% an $aps
in i*ple*ente "unctions+
Missin unctionalit*!
Te1tile
-
7/23/2019 IT Strategy - V4
9/13
'roduct Module Scope @aps
Pu#chasin$
Local(Ra3!,I*po#ts(Ra3!,Fi'#e, Ya#n, Fa'#ic
Len$th% 9o#40o3s, Use#E1pe#ience, Static 9o#40o3s,Pe#"o#*ance Issues,
Ya#n Pa#tial Receipt CaseTole#ance on PO Mt% Leel insteao" Last #e*ainin$ 7t%+
MA Se3in$ Onl% Te1tile, G9P
P6
P#ouct Coe6e8nitions
-
7/23/2019 IT Strategy - V4
10/13
'roduct Module Scope @aps
Co#po#ate
6ash'oa#
Po#tal Po#tal F#a*e3o#4
Social Co*ponent, Inte#actieRepo#ts, Pe#sonaliation, SSO,.o'ile
-
7/23/2019 IT Strategy - V4
11/13
6ata cente# No 6R site
6ual actie sites
O'solete Se#e# 23
-
7/23/2019 IT Strategy - V4
12/13
E1pe#t 'usiness use#s shoul 'e secone "#o* ope#ational epa#t*ents to
3o#4 on p#o)ects 3ith ae7uate 'ac4:8ll #esou#ces p#oie in o#e# to
continue CBL ope#ations an to aoi un#easona'le e*ans on othe# sta+
+e, %estin5 %rainin and &ocumentation
To ensu#e the 'est #esult, it is c#itical that co*p#ehensie testin$ an t#ainin$a#e une#ta4en an use# an IT suppo#t ocu*entation eelope+
+4, Complete 'roram
Pa#tial i*ple*entation o" p#o$#a*s o# initiaties 3ithout consie#ation o" the
oe#all 'usiness an IT eni#on*ent *a% leae si$ni8cant inte#"aces an
s%ste*s una#esse, 3hich #esult in ata inconsistencies, outstanin$
issues an inecient p#ocesses+
+h, Orphaned 'ioneer
Pionee# i*ple*entation o" ne3 technolo$% an so"t3a#e, especiall% "#o* ne3
eno# ent#ants, can lea to the client o#$aniation 'ein$ st#ane o#isolate 3ithout ae7uate suppo#t i" the p#ouct oes not eelop o# #eceie
ta4e up as e1pecte5 the#e"o#e CBL shoul 'e cautious a'out 'ein$ the client
in these ci#cu*stances+
+i, %raininD%estin 2nvironment
Ae7uate t#ainin$ an test "acilities "o# s%ste* co##ections o# p#ouct
up$#aes *ini*ie i*ple*entation #is4s an out o" ate s%ste*s+
+j, S*stem ModiEcation
Custo*ie s%ste*s a#e *o#e icult an e1pensie to suppo#t an
up$#ae5 CBL shoul aopt not aapt 3he#e possi'le+
).. Relevant %echnolo* 2nablers
The pace o" chan$e in the technolo$% eni#on*ent has $#o3n e1ponentiall%+Inust#% anal%sts p#eict that the e1ponential t#en in technolo$% 3illcontinue una'ate+ The#e hae 'een a nu*'e# o" e1its, ac7uisitions an*e#$e#s that hae shape the inust#%+
#n recent times the major 4ocus areas in the technolo* have been!
a. #n Memor* 'rocessin
In *e*o#% p#ocessin$ ata'ase *ana$e*ent s%ste*s an anal%tics $#eatl%i*p#oes s%ste* pe#"o#*ance an ata #et#ieals ti*e ensu#in$ 4e% to "astaccess to ata an #elia'le an s*a#t ecisions+
b. Adaptive ArchitecturesDrameor(sSOA 'ase a#chitectu#es utiliin$ latest eelop*ent "#a*e3o#4s a#e essential"o# applications to *atch the pace o" 'usiness chan$es+
-
7/23/2019 IT Strategy - V4
13/13
c. Cloud Computin and ServicesClou co*putin$ can 'e )ust the suppl% o" p#ocessin$ an ata #esou#ces
(In"#ast#uctu#e As A Se#ice! o# in its pu#est "o#* a'out the p#oision o"
applications an se#ices (So"t3a#e As A Se#ice!+
d. 3ireless %echnolo*9e 3ill see a "e3 thousan s*all cells eplo%e in >=D, allo3in$ ope#ato#s to
inc#ease net3o#4 capacit% in localie a#eas+ S*all cells a#e lo3:po3e#e #aio
access noes that ope#ate in license an unlicense spect#u* that hae a
#an$e o" => *ete#s to = o# 4ilo*ete#s, co*pa#e 3ith a *o'ile *ac#o:cell,
3hich *i$ht hae a #an$e o" a "e3 tens o" 4ilo*ete#s+ S*all cells 3ill help
#e*oe p#essu#e "#o* *ac#o sites an *eet the $#o3in$ e*an "o# ata+
2o3ee#, 3ith the co*ple1it% o" s*all:cell eplo%*ent, the in"#ast#uctu#e o"
s*all cells 3ill eole to suppo#t *ultiple 3i#eless technolo$ies, such as G, DG
an 9i:Fi+
e. Biometric>=D 3ill also see a p#ecipitous #ise in *ulti:"acto# authentication, that is, the
use o" t3o o# *o#e authentication "acto#s to ec#ease the p#o'a'ilit% that an
iniiual is t#%in$ to "alsi"% thei# ientit%+ Bio*et#ics has su#$e as a technolo$%
o" choice in the push to3a#s *ulti:"acto# authentication, an 3e e1pect that to
continue in the %ea# ahea
4. 6irtualiFation
;i#tualiation allo3s one piece o" ha#3a#e (se#e#, es4top, laptop, ta'let,s*a#t phone! to 'e set up to si*ultaneousl% ope#ate 3hat 3oul othe#3ise 'e*ultiple ph%sical eices+
. 6irtualiFation;i#tualiation has #eolutionie IT an it also ena'les the esta'lish*ent o" testan eelop*ent eni#on*ents 3ithout si$ni8cant inest*ent+
h. Securit*
Uni8cation a##a% o" secu#it% c#eentials is al3a%s a heaache "o# 'usiness use#s +Sin$le Si$n Onensu#es that secu#it% an co*pliance policies a#e eectiel%cont#olle+
i. #n4o #ntellienceBI Tools 3ith 'uilt:in options "o# o#$aniational st#ate$% plannin$, ope#ational/PIs *onito#in$ an sco#e:ca#in$ "o# pe#"o#*ance #eie3 an #e:ali$n*ent+Action F#a*e3o#4s "o# intelli$ence actions an inte#actie #epo#ts an
ash'oa#s helps in s%ste*atic in"o#*ation 0o3 in the o#$aniation+j. Mobilit* G Social $etor(in
Lin4e to ta'lets, touch an '#oa'an technolo$%, *o'ilit% solutions a#e
eolin$ at a #api pace+ As the po3e# o" the ha#3a#e an spee o" *o'ile
co**unications inc#eases, the #an$e o" applications is onl% li*ite '%
i*a$ination+