<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1907245749562386&amp;ev=PageView&amp;noscript=1">
Event_bg

The Leonardo Blog

All Posts

Why inventory of IT applications is business critical

15_DEC_Blog_IT.jpg

IT applications contribute to the support of business processes, or other applications, thanks to the execution of IT software. Directly or indirectly, IT applications have one main  purpose: supporting the business in the most efficient way. They can be considered as an asset of the enterprise.

Either custom developed or packaged, IT applications represent a cost: licenses, maintenance, customization, development, running fees, etc.

In a large organization, due to reorganization, acquisitions or lack of coordination, it is hard to keep track of which business processes are supported by which applications.

An inventory of IT applications, united with process descriptions, is the necessary foundation to answer the following questions with fact-grounded confidence:

  • What are the applications that support the most critical processes, and which require attention and investment?
  • Are there applications that are unused (or barely used) for which recurring fees occur?
  • Is it possible to reduce costs by using one application instead of many for the same business purpose?
  • By virtue of the dependencies between applications, is business continuity at risk if there is an IT failure?

Information quality is key

An outdated list of applications (or many disparate sources of information about IT applications) cannot be used as a solid reference; no business decisions can be taken on that basis. That’s why a central inventory of applications needs to be maintained.

Moreover, to allow the level of analysis required to answer business-related questions, it is necessary to link the applications to business processes representations; a repository is required.

An applications repository reaches an optimal level of quality when all necessary information is collected, signed-off, and kept up-to-date.

There are two types of information that need to be recorded:

Attributes

These store the properties of applications: unique enterprise-wide Identifier, name, description, responsibilities, support responsibilities, and assessment of criticality, which can be in the form of a tiered classification, current operational status, indication of update strategy, number of users, etc.

Relationships

Using a repository that integrates a database allows the relationships between applications and other representations to be documented. Relations allow impact-analysis queries between applications and the software products they use, the vendor providing them, the main functionalities they support and, eventually, the processes they support.

15_ITCritical.jpg

It is recommended that a quality-assurance mechanism be put in to assess the calibre of application documentation for completeness of required attributes (semantic quality) and existence of relationships (syntactic quality). It should also include an assessment of the validity of the recorded information.

A pass score can be established to determine which applications descriptions are ready for sign-off and promotion to the library.

Building the applications architecture is a process.

Building an application’s inventory is a process that transforms a heterogeneous, redundant and uncontrolled list of applications into a controlled catalogue placed under the responsibility of the subject matters experts.

To reach the level of information quality required for trustworthy reference and reporting, it is necessary to ensure that each application is identified, documented, and signed-off by the persons in charge of them within the enterprise.

Application inventory – constituted by the applications, their attributes, and relations to other objects – is structured content stored in a database. Yet, it is important to make sure that initial unstructured, incomplete, or approximate content may be taken into account as an initial input.

During discovery phases, a modelling tool that allows collaboration and sharing of application architecture views can be used. Eventually, created application architecture views constitute the graphical communication of the application inventory content stored in the database.

Once it has been signed-off, an application is ready to be placed under architecture control. It is promoted to a library. The library contains validated content and is presented strictly according to conventions. The content of the library is the trusted reference.

Write access to the library is strictly controlled to prevent accidental or uncontrolled modification of the application’s library.

15_ITCritical2.jpg.png

Last recommendations

Deliver services

It is important to stay focused on business needs. When possible, adopt an agile approach to allow rapid implementation and rapid adjustments to the specific needs of users and stakeholders. Try to address immediate needs as much as possible (like the production of reports to illustrate dependencies between applications supporting a specific process).

Facilitate learning

Allow a smooth and progressive adoption of the application inventory building process (it’s a group-learning exercise). Keep it easy. Develop simple conventions, and create a project space where creativity is allowed and mistakes have no consequences. When collecting input from subject matter experts, privilege ‘focus on content’ instead of ‘focus on layout’ or presentation. When possible, make the most of available collaborative software that allows easy screen sharing and cooperation across the enterprise.

Enforce reference material

The application inventory must become referential, communicated, understood and used across the enterprise. It can then be used with confidence for business analysis, planning, and the design of future solutions.

To allow comparison and optimisation, when possible, describe applications by mapping relations to readily available enterprise-wide reference material, like a common application domains model.

Unite with business processes

Applications support business processes: it’s a good way to track an application’s fitness for business purpose.

 

 Enterprise Transformation EA

 

 

.

Frederick Halas
Frederick Halas
Frederick Halas is a Senior Consultant at Leonardo Consulting (www.leonardo.com.au). Frederick joined Leonardo consulting after more than 15 years’ experience in software development, related methodologies and enterprise architecture capability development.

Related Posts

UST Acquires Leading Australian Process Transformation Company Leonardo

UST Acquires Leading Australian Process Transformation Company Leonardo - Strategic acquisition further strengthens UST’s position in the dynamic ANZ market Melbourne, Australia, 21 February 2024:UST, a leading digital transformation solutions company, has announced the strategic acquisition of Leonardo, a leading provider of business process improvement, automation, and integration services in the ANZ region. The acquisition by UST will empower Leonardo to expand its market reach and enhance its service offerings for clients, combining Leonardo's in-depth process expertise with UST's technology leadership, digital transformation capabilities, and global credentials, and strengthening UST's position in the Australian market.

How to Present Business Process Models to Stakeholders

Has an audience member ever interrupted in the middle of a presentation about process analysis to ask, “Can you show us the process models in a simple PowerPoint slide?” – or, ”I don’t want to look at the green and purple boxes, just show me the flow!” Perhaps you then felt that you had wasted some of your efforts in modelling the process with too much detail or in the wrong way. Embarrassed and demoralised, you must have wondered how else could these models be presented. Well, you are not alone! This is a common dilemma when there is a need to present process models to a variety of audiences. There is both art and science in presenting the right level of process detail to the right group of stakeholders, especially if they are not familiar with the process modelling language. Effective presentation is even more critical in larger and complex end-to-end process improvement work and in new automated business model implementations. You may need to use multiple model types to describe the same business processes to various audiences. Hence, it is very important to understand who the stakeholders are and what they would like to see before your audience with them. This article proposes an approach to the effective presentation of business process models based on three key elements: understand, organise, and communicate.

What Are The Most Important Questions In Business Process Management?

She who dies with the most answers wins. We seek the truth. We want to know the answers. Paul Harmon started me thinking recently when he invited members of the BPTrends Discussion group on LinkedIn to “describe the purpose of Business Process Management in 160 characters, including spaces and punctuation.” Not easy to do – have a go at it yourself. It felt like I was crafting The Ultimate BPM Answer, which, of course, begged The Ultimate BPM Question. That got me thinking that The Ultimate BPM Problem is that we have plenty of answers and not enough questions. So put all the answers aside for a moment and help me to work out what are the most important questions in Business Process Management?