Post on 26-May-2015
2. The COTS Integration Challenge Exert from EDS Business Case Analysis:The leveraging of our efforts with other parties through the formulation of a non-profit consortium is the most cost effective and efficient way of achieving the goal of interoperability assurance among heterogeneous systems.This ICH capability will augment our capability and provide us much more information about products, standards, and viable enterprise solution sets than we could ever realize through our own internal efforts. 3. PMs lack the tools to make sound COTS acquisition decisions!CIOs Feel... Overwhelmed by offerings? Ill-equipped to evaluate? Out paced by market? Interoperable? Over hyped?
4. The New IT Solution Paradigm Custom Development gives way to COTS Integration Y e s t e r d a y Design, Code, Test
T o d a y Model, Validate, Integrate COTS Paradigm shift dictates EA driven SDLC processSoftware Components& Off the Shelf Products
5. SAIL is designed to inform existing lifecycle processes (OMG, DoD 5000 series) Architecture Roles Validation Points Respond to Business Change Investment Process /Architecture Project Assessment Framework 1 Assess Business Alignment 2 Assess Business Case Proposal Assess Technology Compliance Target IT App.Port / Infra. Initiatives Aligned per IT Strategy Alignment Scorecard (SELECT) Develop Business Case Compliance Assessment 5 Assess Waiver/ Exception Request Enterprise Design Patterns Acceptable Alignment Acceptable Compliance Unacceptable Conformance Unacceptable Alignment Unacceptable Compliance Proposed Concept Report TRM Standards 4 Evaluate Architecture Compliance IRB Report Audit Reports (EVALUATE) Evaluation Disapproved 3 (SELECT) Project Initialization (CONTROL) Define Build Implement Operate 6. CSF: Break down the acquisition lifecycle stove pipesModelAlignValidateIntegrate
Solution Architecture Critical Success Factors 7. ICH Solution Architecture Integration LabA Collaboratory for the IT Value Chain ... the concept of the Interoperability Clearinghouse is sound and vital. Its developing role as an honest broker of all interoperability technologies, no matter what the source, is especially needed. Such efforts should be supported by any organization that wants to stop putting all of its money into maintaining archaic software and obtuse data formats, and instead start focusing on bottom-line issues of productivity and cost-effective use of information technology.Assessment by Leading FFRDC, 2000 8. The ICH Architecture Assurance MethodSupporting the architecting, development and implementation of the Presidential Priority E-Gov Initiatives
Goals and Objectives: 9. S.A.I.L.s 3 phase Architecture Assurance process leverages best practices and implementation/testing results for sound IT decision making.Normalized BusinessRef Models SolutionExist? Down select Solution Alternatives Establish Arch. WG Solution Architecture Validation and Demonstrations Yes no New CommonCriterion Phase 1:NormalizeBusiness Requirements Phase 3: Analysis ofAlternatives Phase 2: SOA Alignment Agency PMs BusinessRequirements, Policy, & Guidance Integration Lesson Learned A11-300 SolutionArchitecture Validated Best Practices Lessons Learned Value Chain Analysis Solution Patterns Normalized Solution Frameworks Validated Common Criterion COTS Knowledge Base Integrators Consultants AoA Complete? Yes no Service Component Common Criteria Business Patterns Validated BusinessCases & SolutionAcquisition Models; Testing Data and EvidenceIndustry Best PracticesBusiness Ref Models Users Vendors 10. The SDLC outlines a road-map that defines a common and consistent methodology for implementing eGov Initiatives Artifacts and Activities Discovery Requirements
Acquisition Strategy Architecture Integration
Iterative Development Value-Based Releases Understanding the Business Knowing Whats Possible Model the Business Define the Gaps Establishing the building codes Developing the Blueprints Building The Solution Execution
Execute and Manage 11. Develop the business and performance strategy to support the implementation of the Initiative Strategy
Activities Artifacts
12. Identify existing processes, workflow, and capabilities that can be leveraged Discovery
Activities Artifacts
13. Establish short and long-term requirements, define critical success factors Requirements
Activities Artifacts
14. Create Solution Architecture Architecture
Activities Artifacts
15. Source the necessary solution components, establish agreements between agencies and vendors in architecture terms Acquisition
Activities Artifacts
16. Develop and Implement the Initiative (two stages; prototype and full enterprise roll out) Integration
Activities Artifacts
17. Develop and Implement the Initiative (two stages; prototype and full enterprise roll out) Execution
Activities Artifacts
18. ICH Architecture Assurance Method Aligning & vetting the inputs & outputs OFFICE OF THE SECRETARY OF DEFENSE, DEPUTY CIO:"Since the value of the ICH to our programs increases rapidly through results sharing, we encourage the defense community and IT industry to participate directly in the public service initiative in terms of sponsorship and lessons learned" 19. ICH network enables and validates Reference Models thatalignscommon business needs with proven technical solutionsBRM Technical Solution &Metrics ApplicationLayer 1 CommonInfrastructure LayerM BRM Service Components& Metrics (SRM) Appl ServiceComponentsLayer 1 Infrastructure Service Components LayerN BRM Business Drivers &Metrics Core BusinessMission Objectives Business Processes & Infrastructure SAIL Solution FrameworksAligns with business needs Business Driven Top Down Associated Metrics Reference Models Performance Metrics Effectiveness/Efficiency Interoperability,Fit, Finish SAILSolutionLexicon Security Profiles Common Criteria Secure Solutions VendorSolutionTemplates User/Integrator Best Practices 20. Strength of Evidence = Risk Metrics Due diligence on features/functions reduces risk 85% Evidence Sources Strength of Evidence 50% 25% Bi-directionalvendor claim Functional/ conformance testing Implementation successes Integration testing Risk 75% $&time 21. Value Prop:Information Sharing and Collaborationreducestime ,costandriskof redundant IT research and validation efforts Confidence LevelValidation Resources(cost & time line) High Low Risk Delta Acceptable Risk Level Redundant Market Research and Testing SAIL Collaborative Research and Validation Project A Project B Project C StrategyArchitecture Discover ValidationAcquisition Implementation Inconclusive findingsS.A.I.L. Vetting Process Cost/time Delta 22. SAILs accelerated process provides DHS executives with timely access to the information they need to make sound decisions Problem Identification
Process and Requirements
Pattern Creation and Component Alignment
Criteria and Component Assessment
Component Pattern Recognition
Publishing
System Integrators (Domain Expertise) Product Providers (Evidence Assessment) Accelerated Assessment Process (AAP) Prototype Solution Architecture Integration Lab (SAIL) (Component / Product Assessment / Objectivity) 23. Solution Architecture Registry propagation of intellectual capital that can assist in E-Government transformationFEAPMO.gov 24. Example: OnLine Documents 25. Example 2:Technology Area Criteria Selection 26. Example 2:Technology Area Criteria Management 27. Example 2:Technology Area Viewing 28. Shared COTS Research: Eliminating Redundant Study efforts saves $$$$ 29. Validation Process Flows As one of the leading advocates of open systems and interoperability, the OMG believes that the Interoperability Clearinghouse initiative will help users realize the benefits from our combined efforts.OMG, Bill Hoffman, President 30. ISV Product Entry Workflow Workflow engine validates vendor entries Product Data Sheet Composite Features Add New Features New Product/ Standard Profiles TechnologyClass ProfileDocumented Features Select Existing Features Establish XML URL Links Create UML Template Conformance Templates Work FlowManager. Standards Directory Product Directory Standard Specification Validate New Features COTS Validation 31. Functional Validation Process Vendor Statements Work FlowManager. StdsConform. Statement Interop. Statement Functional Statement Conformance Testing Functional Testing Interoperability Testing Testing Results Attach to Product Profile Vendor Concurs 60 Days Pass? Yes No Vendor Correction No Yes Update Product Directory Send to 3rd Parties 3rd Party Product Statement Send Message toSubscribers Interop Validation 32. Interoperability Validation Process Industry validates Vendor Interworking Statements Select Products Tested Show Current Product Connections & Functions ConfirmConnections Existing Links ? Create new Connection & Component Vendor Interop. Submissions ConfirmProduct Functions Determine Level of Effort & Interop. Create Product C4ISR Attrib. Update IC 33. Results from the ICH Process:Interoperable Web-Based Solution ArchitecturesTest Env. (Mercury Intl.) NT4.0 WS Application Libs (C, DLL, MFC) Security Service (PKI X.509) IDL Stub RMI Runtime Win 32 Subsystem|NT Device Drivers J2EE Web Services EJB Comms (TCP/IP) SSL IDE Runtime (Javascript, PB, C++, JDK) Java JITCDirectory Svrs. X.500, or DNS, DHCP J2EE /Web Services Systems Management Server (Patrol) Certificate Validation Win 32 Subsystem - NT Device Drivers Comms (TCP/IP)/ SSL CDS Service Backup Network Mgt. (Open View) Apha or Pentium- Pro NT 4.0 Server Application Client Systems Server Alpha, Pentium Pro NT 4.0 Server Application & System Runtime Modules Security Service (PKI Certificate) Directory Svrs. X.500, DNS, DHCP, LDAP (v1.22) CDS EJBServer (or CORBA Server) TP Mntr. (Encina++) Win 32 Subsystem - NT Device Drivers Comms (TCP/IP) SSL Time Servicer JDBC API Client (Connection Client) Compilers (Java JITC)Application Server or A P I EJBModule RDBMS Server SQL Proxy Server (Connection Server) HP,Sun, or IBMUnixorAlpha NT 40 Server Posix Subsystem (Native or NT), Drivers Comms (TCP/IP) SSL ebXML Server Database Server JDBC Driver OCI/INET XA Lib. (Encina) RDBMS API (ODBC or JDBC) ebXML API HP,Sun, or IBMUnixorAlpha NT 40 Server Posix Subsystem (Native or NT), Drivers Comms (TCP/IP) SSL Web Services WEB Server ODBC Driver (Intersolve) OCI/INET RMI/ IIOP MFI/ Gateway Browser, Native GUI 34. ICH Case Studies Assuring Implementation Success of Commercial Items The ICH repository data and analysis methodologies was very helpful in supporting a quick turn around for [Information Assurance] section of COTS security products. Highly detailed ICH technology domain and product evaluation data comprised over 60% of this urgently needed [architecture] report. GCPR, Program Manager, Northrop Grumman/PRC 35.
Case Study: World Largest Healthcare Project Challenge: develop enterprise architecture for patient record integration 36.
Case Study: World Largest Media Company Challenge: Select enterprise web infrastructure to integrate stovepipe applications 37. Case Study: World Largest Intelligence Agency
Challenge: means of integrating diverse communities via the web 38. Conclusion: The ICH Method is; Industry Developed, Government Approved,Business Driven,Standards-based,Collaborative COTS Selection Process ...on GSA Schedule! ... to help the 24 Presidential Priority E-Gov Initiatives and Federal Agencies with activities surrounding the technical and solution design of their e-Gov initiatives.Mark Forman 39. www.ICHnet.org 703 768 0400 [email_address] Need Help?