user guidelines - Welcome to the Twin Cities Business ...

user guidelines - Welcome to the Twin Cities Business ...

CONNECTING THE DOTS: FROM BUSINESS ARCHITECTURE TO IT NUTS AND BOLTS Dave Goiffon, Enterprise Architect The Business Architecture Summit December 1, 2016 Confidential and proprietary. Blue Cross and Blue Shield of Minnesota and Blue Plus are nonprofit independent licensees of the Blue Cross and Blue Shield Association. PRESENTATION GOAL IS TO SHOW: The progression from using business architecture for planning major business transformations to using whole IT lifecycle management for implementing IT changes to enable major business transformations by tightly coupling business architecture to physical applications, components and infrastructure. Confidential and proprietary. CONTENTS Background

Business Capability Planning Framework Business Capability Model and Capability Application Model Capability Model transformation analysis tools Physical applications* and IT configuration management Mapping business architecture to physical applications and configurations Forecasting and tracking application and component lifecycle changes * Hosted in our data center, not in the Cloud. Confidential and proprietary. BACKGROUND: FRAMEWORKS WITH TOP-BOTTOM AND BOTTOM-TOP MAPS NIST Enterprise Architecture Model - 1989 Zachman Framework for Enterprise Architecture - 1992 Department of Defense (DoD) Architecture Framework (DoDAF) - 1995 The Open Group Architecture Framework (TOGAF) - 1995 Federal Enterprise Architecture Framework - 1999

Confidential and proprietary. 4 BACKGROUND: BCBSMN Origins of the company go back to the early 1930s in St. Paul Information technology at Blue Cross Blue Shield began in late 1950s Information systems and infrastructure (IT) incrementally grew and evolved in proportion to company growth and change Optimizing business operations became a high priority in 2014 Multiple year program to enable support of new business strategies Usual incremental operating performance and platform improvements could limit planned business changes Realizing this goal requires EXTENSIVE architecture-IT top-bottom & bottom-top Confidential and proprietary. 5 PARALLEL, INCREMENTAL WORK FLOWS 2014: Goal set to optimize

operating performance via new platforms, processes and metrics. ct u r st n o C Reti re Target State Operating Solutions Emphasis Current State Operating Solutions Optimizing operating performance involves Incremental construction and implementation of target operating solutions

Incremental retirement of current operating solutions Constraint: Retiring current solutions must not disrupt business operations Confidential and proprietary. 6 CONTENTS Background Business Capability Planning Framework Business Capability Model and Capability Application Model Capability Model transformation analysis tools Physical applications and IT configuration management Mapping business architecture to physical applications and configurations Forecasting and tracking application and component lifecycle changes Confidential and proprietary. FEDERAL ENTERPRISE ARCHITECTURE FRAMEWORK - 1999 Confidential and proprietary.

8 BUSINESS CAPABILITY PLANNING FRAMEWORK Business Capability Click icon to addPlanning picture Framework The BCBS business architecture framework Based on operating models Eight submodels in the complete Business Capability Planning Framework Only two submodels discussed here Descriptions apply to all submodels Application Model

Business Capability Model An abstract and ideally visual representation (model) of how an organization delivers value to its customers or beneficiaries (Wikipedia) Operating Models Datastore Model Technology Model Vendor Ecosystem Model Organization Model Process Model Value Model Confidential and proprietary. 9 QUESTIONS ANSWERED BY BUSINESS CAPABILITY PLANNING FRAMEWORK 1. As a company, what business capabilities do we have?

Confidential and proprietary. 10 BUSINESS CAPABILITY PLANNING FRAMEWORK Business Capability Click icon to addPlanning picture Framework Business Capability Model Operating Models Confidential and proprietary. 11 BUSINESS CAPABILITY MODEL AND CAPABILITY HIERARCHY METAMODEL

L1 Business Capability (9) 1 m L1.L2 Business Capability (47) 1 m L1.L2.L3 Business Capability (230) Defined by the business, for the business

Facilitated, developed and managed by enterprise architects Confidential and proprietary. 12 BUSINESS CAPABILITY MODEL EXAMPLE 6. Manage Back Office Operations 6.3 Manage Billing and Payments 6.3.1 Generate Invoices Confidential and proprietary. 13 QUESTIONS ANSWERED BY BUSINESS CAPABILITY PLANNING FRAMEWORK 1. As a company, what business capabilities do we have? 2. What applications enable business capabilities to operate? Current Application Model and Target Application Model Confidential and proprietary.

14 BUSINESS CAPABILITY PLANNING FRAMEWORK Business Capability Click icon to addPlanning picture Framework Operating Models Business Capability Model Application Model Confidential and proprietary. 15 OPERATING MODEL LAYER: APPLICATION MODEL

Confidential and proprietary. 16 APPLICATION MODEL METAMODEL (9) L1 Business Capability 1 m (47) L2 Business Capability 1 m (230) L3 Business Capability

Enabled by::Enables 0..m 1..m App Role in Capability Confidential and proprietary. Logical Application (~500) Primary Secondary Tertiary 17 SAMPLE APPLICATION MODEL DATA 6. Manage Back Office Operations

6.3 Manage Billing and Payments 6.3.1 Generate Invoices Automated Invoice Generation System (AutoGen) Primary Electronic Invoice Delivery System (IDS-E) Primary Printed Invoice Delivery System (IDS-P) Primary Accounts Receivable Transaction System (ARTS) Secondary Billing Audit Reporting System (BARS) Secondary Confidential and proprietary. 18

QUESTIONS ANSWERED BY BUSINESS CAPABILITY PLANNING FRAMEWORK 1. As a company, what business capabilities do we have? 2. What applications enable business capabilities to operate? Current Application Model and Target Application Model 3. What applications are affected by this transformation (from Current to Target), and how is each affected? Confidential and proprietary. 19 APPLICATION MODEL HEAT MAP Retire Sustain Consolidate Out of scope for this transformation Confidential and proprietary. 20

SAMPLE APPLICATION HEAT MAP DATA 6. Manage Back Office Operations 6.3 Manage Billing and Payments 6.3.1 Generate Invoices Automated Invoice Generation System (AutoGen) Primary Recommendation = Retire Electronic Invoice Delivery System (IDS-E) Primary Recommendation = Retire Printed Invoice Delivery System (IDS-P) Recommendation = Retire Accounts Receivable Transaction System (ARTS)

Secondary Recommendation = Retire Billing-Payment History Viewer (BP Viewer) Secondary Recommendation = Sustain Billing Audit Reporting System (BARS) Primary Recommendation = Retire Confidential and proprietary. Tertiary 21

QUESTIONS ANSWERED BY BUSINESS CAPABILITY PLANNING FRAMEWORK 1. As a company, what business capabilities do we have? 2. What applications enable business capabilities to operate? Current Application Model and Target Application Model 3. What applications are affected by this transformation (from Current to Target), and how is each affected? Application Heat Map Retired, Sustain, Consolidate, Out of scope 4. How and when are current applications changed? Confidential and proprietary. 22 ROADMAPS FOR GETTING FROM CURRENT STATE TO TARGET STATE A roadmap describes how to get from our current state operating models to our target state operating models over time. Current Application Model

Confidential and proprietary. Roadmap Target Operations Business Capability Model Business Capability Model Current Operations Target Application Model w/ App Start Dates Current Application Model w/ App End Dates 23 APPLICATION MODEL METAMODEL

(9) L1 Business Capability 1 m (47) Important properties: Recommended disposition L2 Business Capability (Retire, Sustain, Consolidate) 1 End Date (No longer used; can be retired) m

(230) L3 Business Capability 0..m 1..m App Role in Capability Confidential and proprietary. Logical Application (~500) Major Moderate Minor 24

SAMPLE APPLICATION HEAT MAP DATA 6. Manage Back Office Operations 6.3 Manage Billing and Payments 6.3.1 Generate Invoices Automated Invoice Generation System (AutoGen) Primary Recommendation = Retire; End Date = 2017-09-29 Electronic Invoice Delivery System (IDS-E) Primary Recommendation = Retire; End Date = 2017-09-29 Printed Invoice Delivery System (IDS-P) Recommendation = Retire; End Date = 2017-09-29 Accounts Receivable Transaction System (ARTS)

Secondary Recommendation = Retire; End Date = 2018-03-31 Billing-Payment History Viewer (BP Viewer) Secondary Recommendation = Sustain Billing Audit Reporting System (BARS) Primary Recommendation = Retire; End Date = 2018-12-29 Confidential and proprietary. Tertiary 25

CONTENTS Background Business Capability Planning Framework Business Capability Model and Capability Application Model Capability Model transformation analysis tools Physical applications and IT configuration management Mapping business architecture to physical applications and configurations Forecasting and tracking application and component lifecycle changes Confidential and proprietary. 26 FROM PLANS TO EXECUTION Business architecture operating models work very well for planning and communicating High level, not IT implementation details Business terms, not IT language Logical, not physical However IT cannot execute on operating models

IT needs to know the implemented details Logical applications need to be mapped to physical applications Plans for logical applications need to be transferred to physical applications Confidential and proprietary. 27 QUESTIONS ANSWERED BY THE CONFIGURATION MANAGEMENT DATABASE 1. What applications do we manage (in all environments)? 2. What is the structure of each application in each environment? Examples of component classes: Application infrastructure, Databases and DBMS, Network, Servers, Storage, Mainframe, Data center infrastructure 3. What is the current lifecycle status of each physical application and its components? Operational, Non-Operational, Retired 4. What applications call, or are called by, other applications? Application Calls::Called by Application relationship type 5. [Are there unused configuration items we can retire?] Confidential and proprietary.

28 LESSON LEARNED FROM EARLY LOGICAL-PHYSICAL MAPPING EFFORT The utility value of the logical-physical cross references depends heavily on the of the completeness and accuracy of the physical configuration information in the first place. Incomplete or inaccurate physical application information Causes cross reference rework (!) Increases the risk of disrupting business operations caused by unexpected consequences of undocumented applications or dependencies Software development and support management needs to make configuration management a priority Complete and correct application configurations are performance objectives for every app owner and group manager Confidential and proprietary. 29 MEASURING OUR CONFIGURATION MANAGEMENT PRACTICES

App Dev department objective: 100% complete and correct application configuration info. 2016 Eight characteristics assessed: 1. 2. 3. 4. 5. 6. 7. 8. Process Development Business linkage Management involvement IT Participation Configuration communications Data integrity and protection Governance

2014 Architecture Maturity Models, TOGAF 9.1, Part VII: Architecture Capability Framework, The Open Group, July 21, 2011, http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap51.html Confidential and proprietary. 30 PHYSICAL APPLICATION METAMODEL Important properties: Recommended disposition End Date Operational Status Physical Application Operational Non-operational Retired

Middleware Components Database/File Components Server (Virtual-Physical) Confidential and proprietary. 31 APPLICATION-APPLICATION DEPENDENCIES Individual app owners usually know the composition of their apps App Contains::Part of Component relationships Called by What about application interdependencies? App Calls::Called by App relationships Limited knowledge!

Physical Application Calls Performance management tools are the go-to source of truth Typically provide IP address and port of each connection Look up identity of object at IP address and port in network directory CMDB is updated with directional app dependencies Confidential and proprietary. 32 CONFIGURATION MANAGEMENT COMPLEXITY 3 levels of dependencies shown 5 levels are most common.

Confidential and proprietary. 33 CONTENTS Background Business Capability Planning Framework Business Capability Model and Capability Application Model Capability Model transformation analysis tools Physical applications and IT configuration management Mapping business architecture to physical applications and configurations Forecasting and tracking application and component lifecycle changes Confidential and proprietary. BUSINESS ARCHITECTURE TO PHYSICAL IT MAPPINGS METAMODEL L1 Business Capability L2 Business Capability

L3 Business Capability Logical App properties transferred to Physical Apps: Recommended disposition End Date Logical Application 1 and to Physical App component CIs Physical Application m Middleware

Components Database/File Components Server (Virtual- Physical) Confidential and proprietary. 35 FORECASTING APP AND COMPONENT END DATES: SIMPLE APPLICATION AutoGen 2017-09-29 End Dates 1 Phys App 1 Phys App 1

Middleware CI Confidential and proprietary. Database CI 36 FORECASTING APP AND COMPONENT END DATES: SHARED COMPONENT ARTS AutoGen 2017-09-29 1 2 Phys App 1 Phys App 2 End Dates

Phys App 1 Middleware CI Confidential and proprietary. 2018-03-31 Shared Database CI Phys App 2 Middleware CI 37 FORECASTING APP AND COMPONENT END DATES: APPLICATION DEPENDENCY 2017-09-29 Phys App 1 Middleware CI

Confidential and proprietary. 2018-03-31 2018-12-29 1 2 Phys App 1 Phys PhysApp App22 End Dates BP Viewer ARTS AutoGen

Shared Database CI Depends on Phys App 2 Middleware CI 3 Phys App 3 Phys App 3 Middleware CI 38 INTEGRATING OPERATING MODEL DATA AND CONFIGURATION DATA L1 Business Capability L1 Business Capability

ServiceNow IT Operations: Configuration Management Database (CMDB) L2 Business Capability L2 Business Capability 1-time copy L3 Business Capability L3 Business Capability Manual updates as needed

Logical Application Troux Source Capability Planning System (CPS) Logical Application Physical Application Middleware Components Database/File Components Server (Virtual-Physical) Confidential and proprietary.

39 CONTENTS Background Business Capability Planning Framework Business Capability Model and Capability Application Model Capability Model transformation analysis tools Physical applications and IT configuration management Mapping business architecture to physical applications and configurations Forecasting and tracking application and component lifecycle changes Confidential and proprietary. FORECASTING AND TRACKING: LARGE AUDIENCES FOR BOTH Many audiences need or want to know when application lifecycles are planned to change Operational point of no return Access to legacy data if needed Other audiences need to know when application lifecycles changes are complete IT resources can be re-allocated or released

For use as an indicator of progress towards operating goal(s) Generated reports are primary means of communicating operating solution changes (planned or actual) Process and methods for ad hoc queries are required too Most reports are in Excel and summarized in presentations with Excel charts Confidential and proprietary. 41 APP LIFECYCLE PLANNING AND TRACKING REPORTING Capability Planning System (CPS) [Troux by Planview] ServiceNow Reports & Tables Configuration Management System

[ServiceNow IT Operations Management] SQL Server Repository Perspectium ServiceNow Replicator Troux Link (Custom SQL Server app) IT Data Warehouse BI Tools Confidential and proprietary. 42 SUMMARY The BCBSMN Business Capability Planning Framework and similar business architecture frameworks are highly effective tools for planning business transformations. Executing business architecture transformations requires changes to

the software and systems that enable the business capabilities affected by the transformations. For large business transformations, extensive relationships between business architecture and IT solutions and solution components reduce the time and risk of IT changes to support the business transformations. Confidential and proprietary. 43 THANK YOU. Dave Goiffon, Enterprise Architect, Blue Cross Blue Shield of Minnesota 651-662-1687 [email protected] Confidential and proprietary. Blue Cross and Blue Shield of Minnesota and Blue Plus are nonprofit independent licensees of the Blue Cross and Blue Shield Association.

Recently Viewed Presentations

  • Recruiting and Training Advisers - Order of the Arrow, BSA

    Recruiting and Training Advisers - Order of the Arrow, BSA

    Mission of the Order. Mission Statement of the Order of the Arrow "The Mission of the Order of the Arrow is to fulfill its purpose as an integral part of the Boy Scouts of America through positive youth leadership under...
  • Taken from the Harlequin Songbook by AC and

    Taken from the Harlequin Songbook by AC and

    Taken from the 'Harlequin' Songbook by AC and Black Cauliflowers fluffy and cabbages green Strawberries sweeter than any I've seen Beetroot purple and onions white All grow steadily day and night The apples are ripe The plums are red Broad...
  • What does it mean to be a Muslim - Mr. Neadel's Global History

    What does it mean to be a Muslim - Mr. Neadel's Global History

    Aim: Describe the legacy of Greco Roman Achievements Greco-Roman Culture 2nd Century BCE- Rome conquered Greece and admires them Educated Romans learned the Greek language The mixing of elements of Greek, Hellenistic, and Roman Culture produced Greco-Roman Culture.
  • The Intersection of Dodd-Frank's Whistleblower Provisions and ...

    The Intersection of Dodd-Frank's Whistleblower Provisions and ...

    Highest tipping foreign nations are U.K., Canada, and China (45% of tips between them) Most common complaints related to corporate disclosure and financials (17.2%), offering fraud (17.1%), and market manipulation (16.2%) 149 tips related to alleged FCPA violations (4.6%), up...
  • Consumers Rule - abs.edu.gh

    Consumers Rule - abs.edu.gh

    More and more, regional marketing means marketing right down to a specific zip code. Nielsen Claritas has developed a geoclustering approach called PRIZM (Potential Rating Index by Zip Markets) NE that classifies more than half a million U.S. residential neighborhoods...
  • Using an HTML image (img) elements onclick event

    Using an HTML image (img) elements onclick event

    Make the src of the iframe equal to "" The effect is to eliminate the iframe src (youtube video) until the image is clicked. Repeat for Martin: give iframe an id, give image an onclick, write function to handle onclick
  • S.E. Hinton's The Outsiders

    S.E. Hinton's The Outsiders

    S.E. Hinton's The Outsiders Plot- Book Jacket In Ponyboy's world, there were two types of people. You could be a soc, one of the rich society kids, and get away with anything. Or if you weren't lucky you could be...
  • BrainGene: computational creativity algorithm that invents ...

    BrainGene: computational creativity algorithm that invents ...

    BrainGene: computational creativity algorithm thatinvents novel names. Maciej Pilichowski & Włodzisław Duch. Department of Informatics, Nicolaus Copernicus University, Toruń, Poland