/
Optimizing Your Infrastructure for Sustainability Optimizing Your Infrastructure for Sustainability

Optimizing Your Infrastructure for Sustainability - PowerPoint Presentation

olivia-moreira
olivia-moreira . @olivia-moreira
Follow
400 views
Uploaded On 2016-05-10

Optimizing Your Infrastructure for Sustainability - PPT Presentation

Solution Implementer Guide Agenda Recap Discussions to Date Next Steps Solution Guidance Phase 1 Phase 2 Phase 3 Customize the Capability Requirements Engagement Approach Audience Solution road map ID: 313494

sharepoint server office 2010 server sharepoint 2010 office 2007 data microsoft windows system online 2008 center services management 2012

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Optimizing Your Infrastructure for Susta..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Optimizing Your Infrastructure for Sustainability

Solution Implementer GuideSlide2

Agenda

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability RequirementsSlide3

Engagement Approach

Audience

Solution road map

Solution areas

Industry

Horizontal

Business strategy

Integrated Capability Analysis > Projects, architecture, products

Present relevant integrated capabilities

Position the Integrated Capability approach

Business executives

Understand business needs and priorities

Discuss range of potential solution capabilities

IT

executives

Architects IT pro/dev executivesSlide4

Integrated Capability Analysis

Ensure target business capabilities cover process improvement priorities

Translate business capabilities into required infrastructure capabilities

Assess current infrastructure maturity

Determine gaps to target infrastructure

Build a road map for integrated capabilities and solution implementation

Specify required architecture, technologies, and services

Baseline road map for integrated capabilitiesSlide5

Business Driver

Phase 1

Phase 2

Phase 3

REDUCE THE CARBON FOOTPRINT BY MINIMIZING THE ENVIRONMENTAL IMPACT OF TECHNOLOGY

Allow workers to reduce travel by working remotely, sharing ideas, posting questions, and having general discussions via collaborative workspaces with discussion boards and blogs, secure access to email, secure IM, and standardized audio and video conferencing

Promote the Energy Star program and Electronic Product Environmental Assessment Tool (EPEAT), resulting in lower equipment costs, less electrical consumption for server power and cooling, and less physical space for servers via products that are Energy Star and EPEAT compliant; optimization of the deployment and management infrastructure; and group policies for power settings and centralized control

Enable organizations to remotely monitor and maintain IT resources, visualize problems, and take proactive measures to reduce site visit costs via interactive, personalized, and relevant reports

Securely conduct online meetings and training, and enable workers to collaborate in real time regardless of geography to reduce office space requirements and the need for inter-office and customer-related travel via collaboration tools that support offline access to documents; integrated audio and video conferencing to provide a rich online meeting experience for internal and remote users who need secure, instant collaboration; a unified inbox with voice mail, email, and fax; and email and voice mail on a browser or mobile device

Consolidate multiple workloads onto one platform and make data centers more environmentally friendly via server virtualization to provision new servers rapidly and consolidate multiple workloads onto a physical server; and management of virtual machines

Streamline processes to improve tracking and control of old and outdated equipment and to help ensure correct disposal or recycling of equipment and other consumables via scorecards and dashboards within a collaborative portal platform and self-serve reporting and analysis tools

Fully integrate telecommuting into the culture and business practices to reduce automobile and aircraft emissions via collaborative workspaces and portals that provide access from almost any location, presence-enabled line-of-business (LOB) applications, and software-powered voice over Internet Protocol (VoIP)Take advantage of cloud computing to shift and consolidate resources via a cloud-based platformProvision servers for application portfolio management to lower the number of servers by consolidating applications onto fewer servers via application virtualization to automate and simplify the application management life cycle and reduce regression testingDevelop and distribute applications in the cloud with minimal resources on the premises via measurement through a Business Intelligence (BI)-like reporting sensor and load monitoring by rack and row; and a cloud-based platform to build new applications and use interoperable services in the cloudProactively perform preventative maintenance and achieve other equipment improvements through automated alerts that are linked to more details about root causes, effects, and other troubleshooting data via predictive analysis and data mining to explore data, discover patterns, and drill into historical trend reports; and workflows to generate automated alertsNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide6

Business Driver

Phase 1

Phase 2

Phase 3

MEASURE AND TRACK INTERNAL RESOURCES AND ENVIRONMENTAL IMPACT GOALS

Pull the right information and present it to executives and reporting authorities so they can quickly see issues visually and have an idea of the overall status of operations via easy–to-use wizards and advanced data visualization tools that enable insight into large amounts of historical data quickly and summarize analysis results in reports and charts that are integrated with the portal infrastructure

Collaborate on and publish product design objectives, sourcing policies, packaging and transportation processes, disposal guidelines, internal models and calculation of value streams, and product carbon footprints via effective document management with workflow, collaboration, and search capabilities

Allow managers to train and monitor employees to promote and evaluate remote workers’ effectiveness via custom websites and self-serve reporting and analysis tools; conferencing to support training; and social computing to support training and monitoring

Provide rich visualization of resource metrics to help executives and reporting authorities rapidly identify trends and issues for better predictive analysis via interactive and cascaded scorecards and dashboards that are integrated with the portal infrastructure, to analyze and interpret data and to reveal trends and patterns

Provide collaboration portals for suppliers' approvals and receiving submission requirements of carbon footprint and compliance data via portals tied to LOB systems or business applications; and authoring and publishing web content

Allow for analysis and reporting in near real time to gain visibility and insight into and control over productivity across all employees who work from home via web-based self-serve reporting and analysis tools connected to subject-oriented data

Improve alignment with business strategy by maximizing the ways resources are used via strategy-driven, enterprise-wide scorecards and enterprise project managementEnable executives and reporting authorities to take proactive measures when certain trends begin to change to enable analysis and understanding of the root cause and effects, and to share details and best practices via root-cause analysis with real-time alerts that are integrated with the portal infrastructure and that link to more details to enable visualization and exploration of multi-dimensional dataShare and collaborate on product, packaging, storage, and transportation improvement opportunities internally and throughout the supply chain, and in business modeling and simulation tools via automated core business processes; integration across applications to enable internal and federated access to suppliers and partners; and streamlined creation, publication, and life cycle management of web contentDefine performance levels for telecommuters and measure the outcomes in real time via Web Parts with KPIs and personalized performance viewsAssign role-based key performance indicators (KPIs) for key business metrics that can be monitored for productivity via role-based scorecards and KPIsNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide7

Business Driver

Phase 1

Phase 2

Phase 3

SUPPORT CREATION, MANAGEMENT, AND MONITORING OF COMPLIANCE FRAMEWORKS

Pull together relevant regulatory compliance metrics about energy consumption, carbon footprint, and greenhouse gas emissions to identify ways to fund incentives and drive participation via data mart and IT-driven reports with effective content management to integrate and capture auditable data consistently over time, to reduce risk of exposure to potential regulations, taxation, or increases in energy costs

Accelerate collaboration and information exchange to share best practices and learning, to raise awareness for compliance regulations via web-based self-serve reporting; custom websites and multi-threaded online discussion forums; and search technology to share learning across the organization

Proactively monitor compliance metrics, triggered events, and alerts when compliance is compromised, and give prescriptive guidance about how to mitigate future risk via scorecards and dashboards to monitor compliance metrics, and custom workflows to generate alert notifications when exceptions occur

NORMALIZE CORPORATE COMPLIANCE WITH EXTERNAL ENVIRONMENTAL REGULATIONS

Give the compliance and audit team a consolidated view of environmental regulations, policies, and procedures to make critical information more easily available via interactive diagrams with data visualization to represent complex business data sets cleanly and clearly for compliance and auditing purposes; and content management to collect and manage information to create the consolidated views

Introduce consistency into environmentally sustainable or Green initiatives by driving awareness and making processes automated, repeatable, and reliable via workflows that make processes more prescriptive and repeatable, and assure that the same steps are carried out each time and are shared across the organization

Enable compliance awareness and adoption while monitoring compliance and generating alerts to be aware of every non-compliance issue via custom workflows that use external business rules and generate alert notifications when exceptions occur, and dissemination of policies, practices and compliance status; and search technology to support awareness (discoverability of information)Enable business stakeholders to design, interact with, monitor, innovate, and automate compliance processes and drive collaboration across the organization via workflows that are integrated into custom line-of-business applications with near-real-time tracking of in-process workflowsProvide advanced data visualization to make it easier for users to understand and respond to new compliance requirements via scorecards and dashboards that include information relevant to emerging business and technological compliance initiatives, including energy conservation programs or conservation goalsOptimize compliance processes by managing initiatives, monitoring risks, and delivering alerts to appropriate people to raise environmental awareness via custom workflows that use external business rules and generate alert notifications when exceptions occur

Note to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.

Integrated Capability Support for Priority Business CapabilitiesSlide8

Business Driver

Phase 1

Phase 2

Phase 3

RESPOND TO CONSUMER EXPECTATIONS THAT INDUSTRIES TAKE A HOLISTIC APPROACH TO SUSTAINING THE ENVIRONMENT

Hire and retain next-generation workers by providing a virtual office working environment that has optimized and secure access to critical applications, documents, and data via a virtual private network (VPN), offline and online access to email, collaborative workspaces, secure IM, standardized audio/video conferencing, and the ability to search within content repositories

Increase customer awareness of the "Green code of conduct" the organization enforces in its core operations such as e-commerce, telecommuting, and other activities via custom websites and multi-threaded online discussion forums; and web content management to build awareness by enabling a controlled and broad set of users to contribute and share content

Standardize the methodology for collection and assessment of data about energy consumption, carbon footprint, and greenhouse gas emissions to identify areas for improvement to the strategy to include Green technologies via a data mart to integrate and store data related to energy consumption; and reporting and search to collect and assess carbon footprint and greenhouse gas emissions data

Promote sustainable practices, environmentally preferable offerings, and ecologically efficient strategies to raise customer awareness of corporate involvement in Green initiatives via custom websites and multi-threaded online discussion forums and with web content management

Provide remote workers with the ability to communicate in real time with peers and customers even while on the go via comprehensive pre-authentication; authorization services and single sign on; VPN-based full network access; collaboration tools that support offline access to documents; integrated audio and video conferencing; a unified inbox with voice mail, email, and fax; and email and voice mail on a browser or mobile device

Strengthen the organization's web presence by branding products and services with specific environmentally friendly attributes such as recyclable or biodegradable, or by establishing measurable sustainability baselines and improvements via custom websites with content that supports environmentally friendly branding; and integrated rich media capabilities and reporting on KPIs

Implement environmentally sustainable business policies and practices to align Green initiatives with the brand image via collaboration and user-driven reportingProvide customers the ability to share ideas, give feedback, and suggest improvements to sustainable offerings, including products and services, to keep customers engaged via social computing technologies such as blogs and wikis to share views and opinions, IT-driven reports, and authoring and publishing web contentUpdate the infrastructure for next-generation workers by using the cost-savings gained by enabling remote workers via application virtualization for automated application distribution, collaborative workspaces and portals that provide access from almost any location, presence-enabled LOB applications, and software-powered VoIPSafeguard information when workers access sensitive data from remote locations via rights management and information protectionCollect customer feedback and suggestions for improvement to the organization's environmental initiatives via custom websites that have multi-threaded online discussion forums; social computing technologies such as blogs, wikis, and other people-centric venues that support communication among people with common interests; and streamlined creation, publication, and life cycle management of web contentAnalyze sustainability performance data, plans, and targets to increase performance transparency and mitigate risk via predictive reports linked to an environmental sustainability dashboard that tracks and displays effects of these policies and practicesMeasure and report on metrics related to Green initiatives and identify opportunities to stimulate more sustainable processes to improve customer relationships via reports, scorecards, and dashboards to analyze, monitor, and plan environmental sustainability initiatives; and streamlined creation, publication, and life cycle management of web contentNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide9

Business Driver

Phase 1

Phase 2

Phase 3

PARTICIPATE IN BUSINESS OPPORTUNITIES THAT SUSTAIN THE ENVIRONMENT

Collect employee feedback and knowledge, share best practices, and learn from each other to protect and sustain the environment via a centralized knowledge base and content-centric social computing

Improve access to key operational and resource data across the organization to identify the regulatory, physical, and general risks that climate change poses to the business via a data mart with heterogeneous data support to access data that is shared throughout the organization; desktop analysis; and a collaboration infrastructure and search technology to improve access to data

Easily tap into information about carbon position, footprint, and liability stored in disparate data systems and develop key process indicators to quantify metrics for managing carbon certificate inventory via a data mart to integrate and store data about to carbon use; scorecards with KPIs for managing the carbon certificate inventory; and a collaborative workspace and portals to help workers manage and disseminate relevant information

Make the knowledge base and portal infrastructure available to more people within and outside the organization to improve collaboration via integration of the knowledge base with collaborative workspaces and the portal infrastructure, and forms-driven workflows to route ideas

Provide the ability to analyze metrics related to energy usage, carbon emissions, water inefficiencies, and greenhouse gas emissions to make informed risk assessments via scorecards and dashboards to seamlessly analyze off-target KPIs

Enable workers to monitor key performance indicators that are linked to various systems to help initiate processes such as carbon trading via balanced scorecards that are integrated with the portal infrastructure and that have defined KPIs that draw data from data warehouse, and dashboard content that is optimized for the web

Provide social computing capabilities within and across the enterprise, including suppliers and customers, to collect feedback and gather suggestions for improvement via social computing technologies such as blogs and wikis to share views and opinions, and subscriptions to external newsfeeds to learn about new developmentsEnable ongoing optimization and alignment of processes with corporate sustainability guidelines by analyzing the carbon footprint and environmental impact of suppliers to maintain a resilient and sustainable supply chain via strategy-driven enterprise-wide scorecards to monitor and analyze KPIs in real timeEnable real-time availability of operational information across the organization and provide the ability to compare data with competitors and analyze trends via a centralized and managed data warehouse that helps ensure real-time availability of operational information; and reporting and analysis to identify trends, patterns, and opportunitiesNote to presenter: This is a template.Prune, add, and prioritize per BDM and TDM feedback.Ensure consistency with the “Business Discussion Guide” and the “Capability Discussion Guide”.Integrated Capability Support for Priority Business CapabilitiesSlide10

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the

Capability

Requirements

AgendaSlide11

MEASURE AND TRACK INTERNAL RESOURCES AND ENVIRONMENTAL IMPACT GOALS

SUPPORT CREATION, MANAGEMENT, AND MONITORING OF COMPLIANCE FRAMEWORKS

NORMALIZE CORPORATE COMPLIANCE WITH EXTERNAL ENVIRONMENTAL REGULATIONS

RESPOND TO CONSUMER EXPECTATIONS THAT INDUSTRIES TAKE A HOLISTIC APPROACH TO SUSTAINING THE ENVIRONMENT

PARTICIPATE IN BUSINESS OPPORTUNITIES THAT SUSTAIN THE ENVIRONMENT

REDUCE THE CARBON FOOTPRINT BY MINIMIZING THE ENVIRONMENTAL IMPACT OF TECHNOLOGY

Sophistication of the Solution

Phase 1

Provides basic support for the most critical elements of the business driver

Phase 2

Provides adequate, typical support for critical and priority elements of the business driver

Phase 3Provides thorough, streamlined support for the business driver that enables differentiated levels of performanceSlide12

Solution Guidance

CONCEPTUAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIES

LOGICAL

ARCHITECTURE

CONCEPTUAL

ARCHITECTURE

MAPPINGPHASE DEFINITION

TECHNOLOGIES

LOGICAL

ARCHITECTURE

Phase Definition

For each business driver, list the business challenges, solution features, and business benefits for this solution phase. Use this information and the “Integrated Capability Support for Priority Business Capabilities” slides to structure the conversation with IT professional(s) for capturing, refining, and baselining business problems and solution functionality priorities.

Mapping

The Optimization mapping indicates the maturity level required for each capability to fully support the features specified in this solution phase. Use the mapping as a starting point to determine appropriate maturity levels for the solution. After mapping the solution, assess the gap between the current and desired infrastructure to:

Understand the scope and sequencing of work required

Organize a deployment road map

Technologies

Use the results of the Optimization mapping to determine the technologies required for the features and supporting capabilities specified in this solution phase.

Conceptual Architecture

Use this high-level, use case diagram to provide the “black box” definition of this solution phase. Customize to your solution definition during the integrated capability analysis.

Logical Architecture

Use this logical, component-level architecture view to show all software components and how they interact to support this solution phase. Tailor to fit your particular solution definition during the integrated capability analysis. 

Note: Physical architecture is covered in the Architecture Guide also used during the integrated capability analysis.Slide13

Agenda

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability RequirementsSlide14

Phase 1

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Business

DriverNeedsBusiness CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology

Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting

Make data centers more environmentally friendly

Manage utilization of distributed IT resources such as laptops, printers, and other devices

Allow workers to reduce travel by working remotely, sharing ideas, posting questions, and having general discussions

Promote the Energy Star program and Electronic Product Environmental Assessment Tool (EPEAT), resulting in lower equipment costs, less electrical consumption for server power and cooling, and less physical space for servers

Enable organizations to remotely monitor and maintain IT resources, visualize problems, and take proactive measures to reduce site visit costs

Measure and track internal resources and environmental impact goals

Establish resource utility baselines and the means to measure and report improvements

Empower customers to make ecologically friendly choices based on the reported environmental impact of products

Track and measure the impact of teleworking

Pull the right information and present it to executives and reporting authorities so they can quickly see issues visually and have an idea of the overall status of operations

Collaborate on and publish product design objectives, sourcing policies, packaging and transportation processes, disposal guidelines, internal models and calculation of value streams, and product carbon footprints

Allow managers to train and monitor employees to promote and evaluate remote workers’ effectiveness

Support creation, management, and monitoring of compliance frameworks

Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently

Pull together relevant regulatory compliance metrics about energy consumption, carbon footprint, and greenhouse gas emissions to identify ways to fund incentives and drive participation

Normalize corporate compliance with external environmental regulations

Ensure that organizations are informed and complying with environmental sustainability regulations

Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations

Give the compliance and audit team a consolidated view of environmental regulations, policies, and procedures to make critical information more easily available

Introduce consistency into environmentally sustainable or Green initiatives by driving awareness and making processes automated, repeatable, and reliableSlide15

Phase 1

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Business

DriverNeedsBusiness CapabilitiesRespond to consumer expectations that industries take a holistic approach to sustaining the environment

Attract, hire, and retain workers in virtual workplaces

Improve the organization's image related to corporate social responsibility (CSR) by supporting measurable improvements in environmental sustainability and Green initiatives

Include Green technologies as a strategy that complements brand imageEmpower customers by providing incentives to be more environmentally aware and choose sustainable offerings

Hire and retain next-generation workers by providing a virtual office working environment that has optimized and secure access to critical applications, documents, and data

Increase customer awareness of the "Green code of conduct" the organization enforces in its core operations such as e-commerce, telecommuting, and other activities

Standardize the methodology for collection and assessment of data about energy consumption, carbon footprint, and greenhouse gas emissions to identify areas for improvement to the strategy to include Green technologies

Promote sustainable practices, environmentally preferable offerings, and ecologically efficient strategies to raise customer awareness of corporate involvement in Green initiatives

Participate in business opportunities that sustain the environment

Capturing the power and passion of employees to learn, share, and re-evaluate opportunities to sustain the environment, so the organization can implement opportunities that have the highest potential for impact and profit first

Address the risk of climate change for the business, supply chain, and target markets

Establish a carbon trading platform to plan and manage the carbon certificate inventory

Collect employee feedback and knowledge, share best practices, and learn from each other to protect and sustain the environment

Improve access to key operational and resource data across the organization to identify the regulatory, physical, and general risks that climate change poses to the business

Easily tap into information about carbon position, footprint, and liability stored in disparate data systems and develop key process indicators to quantify metrics for managing carbon certificate inventorySlide16

Phase 1: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

A defined software library exists. Automated build with defined deployment and provisioning processes. Physical and virtual hardware, software, and consumption unit assets are reconciled and reported on demand (manual or automated), and tools and data repository are in place to track and audit assets. Capacity management processes are manual and reactive, resource utilization and capacity are monitored periodically. The organization actively uses virtualization to consolidate resources for production workloads. Some Production server resources are virtualized. A virtualized server pool is offered as a service. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. IT services are audited for compliance based on documented company and industry-standard policies (HIPAA, SOX, and PCI); reports are generated monthly. Services are available during server failure (e.g. server clustering, hot spares, and/or virtualization recovery solution). Users can only have visibility into specific VMs based on business units but manual security isolation exists between the VMs themselves.

Server Security

Malware protection is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as e-mail, collaboration and portal applications, instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, Web security, gateway anti-virus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across datacenter, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.

Networking

Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and with support for auto configuration. Using IPv6 with IPSec for secure private communication over public network.

Storage

Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.

Device

Deployment and Management

Device Mgt & Virtualization

An image library and deployment process are in place for operating systems and/or applications. The majority of the installed client base has a minimum of one year of mainstream support remaining. Some applications are virtualized, but most are installed as packages or are included in the standard image. Desktop applications and system events are centrally monitored for critical desktop systems. Configurations are standardized; systems are assessed for compliance, and some settings are enforced through group policies. Hardware and software inventory is automated and reporting is centralized; information may not be complete or accurate, and typically is not used for decision-making; inventory is reconciled annually. A solution is in place to configure and update devices.

Device Security

Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.

Identity

& Security

Services

Identity & Access

To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods, and machines; access control is role-based. Federation exists for selected applications. For consumer facing applications, federating with public providers (such as Facebook). Password policies are set within a directory service to enable single sign on across boundaries for most applications. Password resets through internal tools or manual processes. There is a centralized group/role based access policy for business resources, managed through internal tools or manual processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.

Information Protection & Control

IT Process & Compliance

IT service portfolio aligns with individual business units; the IT service costs, returns, capacity, availability, continuity, and integrity are reported. IT policies are documented for each IT service. Each IT service has a formal definition of reliability. Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Processes to manage incidents are in place for each IT service. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Problem management processes are in place for each IT service, with self service access to knowledge base. Each IT service has its own change and configuration management process; standard changes are identified for each IT service. Ownership and accountability are assigned for each IT service. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service. Defined orchestration with scripted processes to support manual execution. Location of data is compliant to local regulations.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide17

Phase 1: BPIO

B

S

R

D

Collaboration

Workspaces

Workspaces are managed at the departmental level and are available from individual productivity applications. Teams work on managed versions of content with controls and common space; team workspaces include group calendaring, shared contacts, user online presence, and simple workflows. Self service onboarding, integration with identity systems, training for users is mandatory and enforced.

Portals

Users and groups can publish content directly to some portals; workflow for review and approval is built-in and automated. Users have widgets to customize their views of information; enterprise search is integrated with portals. Portals (enterprise, departmental, and personal) are provisioned by IT and are deployed on a single productivity infrastructure; governance policies are fully in place, including single sign-on supported by uniform directory services.

Social Computing

Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices. Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.

Project Mgt

Information access

Most unstructured information from intranets, e-mail, and content management repositories is indexed; some structured content from databases, people, and expertise information is indexed.

Interactive experience and navigation

A basic interactive search experience incorporates faceted and filtered information based on common or explicit metadata.

Messaging

The messaging solution (e-mail and calendar) includes basic anti-virus, anti-spam, and anti-phishing protection. Use of high availability technologies enables messaging system continuity at the server and service levels during outages. The e-mail platform supports message encryption (S/MIME) to enable digital signatures. Secure, remote, online and offline access to rich mailbox and calendar functionality exists inside and outside the firewall. IT manages mailbox provisioning by using a single directory. Users have separate discovery tools for live and archived mailbox data and must rely on the IT department to conduct searches.

Unified Communications

IM/Presence

Users have secure access to an enterprise-managed online presence and IM infrastructure from inside and outside the firewall; peer-to-peer voice and video communications are based on a single directory. Online presence information (automatically refreshed user availability information based on communications, log-on, and calendar activities) is integrated into the e-mail client.

Conferencing

A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.

Voice

Voice communications are secure, encrypted, extended to remote and mobile workers using different mobile devices and integrated within enterprise productivity and collaboration platforms. Network techniques (quality of service and call admission control) provide preferential treatment for voice traffic within the corporate IP network. Call routing between sites is based on lowest cost.

Content Creation and Management

Information Mgt

Managed workspaces exist at the departmental level and are available from individual productivity applications. Metadata capture is enforced; however, the capture process is manual and labor-intensive. Web sites are built using off-the-shelf Web content management platforms; styles and templates are used consistently; content owners are empowered by technology to publish and manage their own information, but most still rely on Web specialists. The enterprise has inventoried content and put plans, policies, and procedures in place. Notions of information lifecycle management begin to get incorporated.

Process Efficiency

Custom solutions developed by IT are used to deliver and manage key forms electronically; form data and scanned paper-based content are stored in a custom data repository. The organization uses basic workflow tools to process, review, and approve documents; simple workflow routing is part of the collaborative workspace infrastructure.

Compliance

Policy definition occurs at the content repository level and covers retention and disposition of all types of content, including e-mail; reporting occurs manually. Content is stored in a well-managed repository and disposition rules are appropriately applied; content can be rapidly identified and preserved; business relies heavily on outsourcing for review and processing of evidence.

Authoring

Users can intuitively preview, discard, or accept formatting and content; formatting can be saved in templates for reuse.

Multi-Device Support

Rich client, Web, and other applications have a consistent user interface paradigm that is optimized for usability and discoverability. Documents can be delivered or exchanged with high fidelity between all internal and most external users.

Interoperability

User Accessibility

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide18

Phase 1: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Self-service reporting and analysis environment and tools established and maintained by IT. Access to data is decentralized but governed by IT with a well-defined process for stewardship and governance. Portals exist for dynamic reporting that supports rich report formats. Reports are generated with group or individual filter parameters and delivered via direct push or subscription and can vary by device. Users have the ability to share alerts and subscriptions with other users via limited collaboration and social networking. A standardized approach is in place for IT to provision data sources for access to users to search across structured and unstructured content. A basic interactive search experience is provided to users that incorporates filter information based on common or explicit metadata. From the BI portal, users are able to connect to internal and external data sources and combine them in a single report or data set for further analysis. Users can do sophisticated analysis and build rich BI applications using Excel or other analysis tools. BI portal has reporting and analysis capabilities that include exception highlighting, guided analysis, and predictive analysis with rich logic. Some level of automation is in place to render data pulled from enterprise systems on dashboards, but is used for only strategic or high profile projects. Dashboards have integrated interfaces to allow users to roll-up and drill-down on live data.

Data Warehouse Management

EDW is refreshed on a near real-time basis so that information is readily available to mission-critical applications, analytics, and reporting systems. A high degree of concurrency exists, with many users running complex queries and interacting with complex analytics tools simultaneously with data loading. Management and maintenance of storage, hardware, and supporting software is manual and ad hoc. Data mart data structures are optimized for local reporting and analysis performance and user understanding, including use of star/snowflake schemas. Data marts feed a centralized data warehouse that effectively relays information across most key areas of the business. Loading of data into data marts and from data marts to the enterprise data warehouse includes automated transformations to reconcile and validate the integrity of the data. Consistency in data warehouse operation and maintenance across distributed data marts is improved through use of common tools, policies, and sharing of best practices, driven by the EDW team. SLAs emerge. Data changes can be planned through standard impact analysis, and effective collaboration occurs across data mart and EDW teams. An IT-managed BI environment is in place and applications at the department level integrate with departmental data marts. IT designs, implements, and manages data schemas that are optimized for localized self-service reporting and analysis tools.

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Key high-value data has associated formal data management policies and processes.  Data governance may be recognized on a siloed basis, but not as a corporate discipline. Data and asset inventories and dependency relationships are manually documented periodically. Access policies for data and objects in databases are defined but not centralized, and do not reference data classifications. Administrative tasks are still performed using an over-privileged account.  Security management is performed on a server-by-server basis. Systems are in place for retention backup. Organizational/departmental policies exist for how long items are stored and what is stored. Auditing is sparingly used or not used at all. Metrics focus on expiration dates for information, files, and other electronic forms to address known compliance risks.

Application Infrastructure

Custom Development

Internet Applications

User experience is a full part of the site development process, but refinements to the overall process can be made. Up-to-date versions of rich Internet technologies are used, and are often used appropriately, but not always (for example, plug-in based applications may be used to provide site navigation). Limited use of server-side scripting exists. Pages are written with separation of code and styling, and sites may have a variety of overlapping styles. Custom code is needed on-page to reach multiple browsers. Limited video infrastructure exists. One or more Web servers may be dedicated to progressive download or on-demand streaming. The site may use more than one video format and simple embedded players specific to different sections of their site. The site may also use rudimentary workflow for content publishing. Separate corporate communications and departmental video infrastructure exists with a combination of progressive download and streaming.

Component and Service Composition

Enterprise Integration

Development Platform

Standard application frameworks, messaging, and other application services aligned with standard application operating environments are appropriately and consistently employed by application development teams. Tools for major development activities are standardized across the organization, though practices and versions are not.

Application Lifecycle Management

Work-breakdown structures map estimated work to business value. Rudimentary metrics are used to manage project progress. Project managers aggregate data from standard status updates. Effective change management processes are in place. Testing has test harnesses and some automation, formal unit testing with good code coverage, and defined test strategy and processes. Explicit use of code quality tools typically occurs at the end of the development cycle. Processes are defined for debugging production defects and incidents, with a standard set of defect artifacts.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide19

Technology Guidance

Client Technologies

Microsoft

Office 2007 / 2010

Microsoft Office

Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel

2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010

Microsoft Office

InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio

2007 / Microsoft Visio 2010Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010

Microsoft Office Project 2007 / Microsoft Project 2010Microsoft Forefront

Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Windows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL Server 2008 R2 / 2012Microsoft Server SecurityMicrosoft Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange ServerMicrosoft Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway 2010Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway 2010Microsoft Windows Server 2008 R2 / 2012Microsoft System CenterMicrosoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations ManagerMicrosoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection ManagerMicrosoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager

Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device

ManagerMicrosoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager

Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service Manager

Opalis

/ Microsoft System Center 2012 Orchestrator

Microsoft

System Center 2012 App

Controller

Microsoft Desktop Optimization Pack 2011 / 2011

R2

Windows Embedded Device Manager

2011

Microsoft Windows Storage Server 2008 / 2008

R2

Microsoft Hyper-V

Server 2008 / 2008

R2

Microsoft Virtual Desktop Infrastructure

Suite

Microsoft Office Project Server 2007 / Microsoft Project Server

2010

Microsoft Office Project Portfolio Server

2007

Cloud

Technologies

BPOS / Microsoft Office

365

Microsoft Exchange

Online

Microsoft SharePoint

Online

Microsoft Office Communications Online / Microsoft

Lync

Online

Windows

Azure

platform

Windows

Azure

Active Directory Access

Control

Microsoft SQL Azure

Windows

Intune

Microsoft

Office Web

Apps

Microsoft Exchange Hosted

Services

Microsoft Online Backup Service

Development

Tools

Microsoft Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation

Server

Microsoft Visual Studio Team System 2008 / 2010 /

11

Microsoft

Expression

Studio 3 / 4

Tools, Add-ins, Libraries, and Frameworks

Microsoft Assessment and Planning Toolkit 6.0 /

6.5

Microsoft Security Assessment

Tool

Microsoft Software Inventory Analyzer 5.0 /

5.1

Microsoft Deployment Toolkit 2010 /

2012

Windows Automated Installation

Kit

Microsoft Security Compliance Management

Toolkit

Compliance Management Libraries

2.0

Data Classification

Toolkit

IT Governance, Risk and Compliance process management pack

2.0

Microsoft Windows

PowerShell 2.0Slide20

Phase 1: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Server Consolidation); Hyper-V Server 2008 R2 (Server Consolidation); Hyper-V Server 2008 / 2008 R2 Standard; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Microsoft Software Inventory Analyzer 5.0 / 5.1; Opalis; Security Compliance Management Toolkit; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V); Windows Server 2008 R2 Standard / Enterprise (Hyper-V)

Server Security

Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (Web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Intelligent Application Gateway 2007; Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2012

Networking

Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)

Storage

Microsoft Online Backup Service; System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2008 R2 (Backup and recovery); Windows Server 2012 (Backup/Recovery, Hyper-V Replica); Windows Storage Server 2008 (Backup and recovery); Windows Storage Server 2008 R2 (Backup and recovery)

Device

Deployment and

Management

Device Mgt & Virtualization

Exchange Server 2007 / 2010; Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Mobile Device Manager 2008; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2012 (Remote Desktop Services)

Device Security

Forefront Endpoint Protection 2010; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Server 2008 R2 / 2012

Identity

& Security

Services

Identity & Access

Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012

Information Protection & Control

IT Process & Compliance

Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint Server 2010; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide21

Phase 1: BPIO

B

S

R

D

Collaboration

Workspaces

Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 (client integration with SharePoint); Office 2010 (client integration with SharePoint); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (integrated presence, Outlook Web Access Web Parts, news and announcement Web Parts, out-of-the-box workflow); SharePoint Designer 2007 (Workflows); SharePoint Designer 2010 (Workflows); SharePoint Online (client integration, templates and Web Parts, presence, synch with Outlook, standard workflows); SharePoint Online (document workspaces, client integration); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (document workspaces); SharePoint Server 2010 (integrated presence, Outlook Web Access Web Parts, news and announcement Web Parts, out-of-the-box workflow)

Portals

Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)

Social Computing

Office 2007; Office 2010 (content tagging within applications); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, e-mail alerts and notifications); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (e-mail alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, e-mail alerts and notifications); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)

Project Mgt

Information access

Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online P1 / P2; SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)

Interactive experience and navigation

Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (faceted search, filtering, navigation); SharePoint Online (faceted search, filtering); SharePoint Online P1 / P2; SharePoint Server 2010 (faceted search, filtering, navigation)

Messaging

Exchange Hosted Encryption; Exchange Online; Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Server 2007 / 2010; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Web Access 2007; Outlook Web Access 2010

Unified Communications

IM/Presence

Exchange Online; Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 (integrated presence indicator); Outlook 2010 (integrated presence indicator)

Conferencing

Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 (integrated conferencing); Outlook 2010 (integrated conferencing)

Voice

Lync 2010; Lync Online; Lync Server 2010; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2

Content Creation and Management

Information Mgt

Office 2007 (document information panel); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (Web content editor, master pages, page layouts, controls); SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online (document workspace); SharePoint Online (metadata); SharePoint Online (site manager); SharePoint Online (Web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (Web content editor, master pages, page layouts, controls)

Process Efficiency

Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (workflow integration through Backstage); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (out-of-the-box workflows); SharePoint Designer 2007 / 2010; SharePoint Online (form libraries); SharePoint Online (out-of-the-box workflows); SharePoint Online P1 / P2; SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (out-of-the-box workflows)

Compliance

Office 365 E3 / E4; Office SharePoint Server 2007 (records center); Office SharePoint Server 2007 (records repository); SharePoint Online (records center); SharePoint Online (records repository); SharePoint Server 2010 (records center); SharePoint Server 2010 (records repository)

Authoring

Office 2007; Office 2010 (copy/paste improvements with Live Preview, Office Backstage, paste galleries, insertion of screenshots; Word: document map, photo masking and cropping); Office 365 E3 / E4; Visio 2007 (brainstorming diagram, business templates); Visio 2010 (brainstorming diagram, business templates)

Multi-Device Support

Office 2007; Office 2007 (rendering fidelity investments, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (rendering fidelity investments, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office SharePoint Server 2007; SharePoint Server 2010 (Fluent UI); Visio 2007; Visio 2010 (rich client, share diagrams with others on the web)

Interoperability

User Accessibility

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide22

Phase 1: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online; SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010

Data Warehouse Management

SQL Server 2008 / 2008 R2; SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; Visual Studio 11; Visual Studio 2008 (BI Development Studio); Visual Studio 2010

Big Data

Information Services and Marketplaces

Database and LOB

Platform

Transaction Processing

Data Management

Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2; SQL Server 2012

Application Infrastructure

Custom Development

Internet Applications

Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 6 / 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; Visual Studio 11; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio 2010 Professional

Component and Service Composition

Enterprise Integration

Development Platform

Visual Studio Team Foundation Server 2010

Application Lifecycle Management

Office Professional 2010; Project 2010; Visual Studio 11; Visual Studio 11 Team Foundation Server; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio Team Foundation Server 2010

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide23

CONCEPTUAL

ARCHITECTURE

Phase 1

MAPPING

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITION

CONCEPTUAL

ARCHITECTURESlide24

Phase 1

LOGICAL

ARCHITECTURE

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

MAPPING

PHASE

DEFINITION

LOGICAL

ARCHITECTURESlide25

Agenda

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability RequirementsSlide26

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Business

Driver

Needs

Business CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology

Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting

Make data centers more environmentally friendly

Manage utilization of distributed IT resources such as laptops, printers, and other devices

Securely conduct online meetings and training, and enable workers to collaborate in real time regardless of geography to reduce office space requirements and the need for inter-office and customer-related travel

Consolidate multiple workloads onto one platform and make data centers more environmentally friendly

Streamline processes to improve tracking and control of old and outdated equipment and to help ensure correct disposal or recycling of equipment and other consumables

Measure and track internal resources and environmental impact goals

Establish resource utility baselines and the means to measure and report improvements

Empower customers to make ecologically friendly choices based on the reported environmental impact of products

Track and measure the impact of teleworking

Provide rich visualization of resource metrics to help executives and reporting authorities rapidly identify trends and issues for better predictive analysis

Provide collaboration portals for suppliers' approvals and receiving submission requirements of carbon footprint and compliance data

Allow for analysis and reporting in near real time to gain visibility and insight into and control over productivity across all employees who work from home

Improve alignment with business strategy by maximizing the ways resources are used

Support creation, management, and monitoring of compliance frameworks

Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently

Accelerate collaboration and information exchange to share best practices and learning, to raise awareness for compliance regulations

Normalize corporate compliance with external environmental regulations

Ensure that organizations are informed and complying with environmental sustainability regulations

Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations

Enable compliance awareness and adoption while monitoring compliance and generating alerts to be aware of every non-compliance issue

Enable business stakeholders to design, interact with, monitor, innovate, and automate compliance processes and drive collaboration across the organization

Phase 2Slide27

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Business

Driver

Needs

Business CapabilitiesRespond to consumer expectations that industries take a holistic approach to sustaining the environment

Attract, hire, and retain workers in virtual workplaces

Improve the organization's image related to corporate social responsibility (CSR) by supporting measurable improvements in environmental sustainability and Green initiatives

Include Green technologies as a strategy that complements brand imageEmpower customers by providing incentives to be more environmentally aware and choose sustainable offerings

Provide remote workers with the ability to communicate in real time with peers and customers even while on the go

Strengthen the organization's web presence by branding products and services with specific environmentally friendly attributes such as recyclable or biodegradable, or by establishing measurable sustainability baselines and improvements

Implement environmentally sustainable business policies and practices to align Green initiatives with the brand image

Provide customers the ability to share ideas, give feedback, and suggest improvements to sustainable offerings, including products and services, to keep customers engaged

Participate in business opportunities that sustain the environment

Capturing the power and passion of employees to learn, share, and re-evaluate opportunities to sustain the environment, so the organization can implement opportunities that have the highest potential for impact and profit first

Address the risk of climate change for the business, supply chain, and target markets

Establish a carbon trading platform to plan and manage the carbon certificate inventory

Make the knowledge base and portal infrastructure available to more people within and outside the organization to improve collaboration

Provide the ability to analyze metrics related to energy usage, carbon emissions, water inefficiencies, and greenhouse gas emissions to make informed risk assessments

Enable workers to monitor key performance indicators that are linked to various systems to help initiate processes such as carbon trading

Phase 2Slide28

Phase 2: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

Software and configuration library is maintained at current update levels with version control and auditing on demand. Automated build and deployment with consistent provisioning processes integrated with software and configuration library that includes virtual images; on demand reporting; self service portal for IT or end users to deploy. The IT asset life cycle is automated, and managed using policies, procedures, and tools; management of assets and thresholds are based on automated inventory information. Service capacity and resource utilization are monitored continuously; analysis tools are used to predict the impact of proposed changes (software, hardware, usage, and topology); Workloads can be relocated manually. Chargeback is consumption based. The organization has a consolidated view and a consolidated management process across heterogeneous virtual environments, including branch offices. Performance monitoring of applications as well as physical and virtual hardware pools with enforceable SLAs; Service health monitoring with consistent reporting across heterogeneous environments. Policy enforcement occurs in near real time based on company and industry-standard polices that allow for immediate quarantine of non-compliant systems, and consistent compliance reporting and standards exist across all IT services. There are multiple levels of service availability clustering or load balancing. Virtualization and management is used to dynamically move applications and services when issues arise with datacenter compute, storage and network resources.

Server Security

Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.

Networking

Redundant Domain Name System servers exist on a separate network to provide fault tolerance and isolation, including ability to do zone transfer across boundaries.

Storage

Critical data is backed up by taking snapshots using a centralized, application-aware system.

Device

Deployment and Management

Device Mgt & Virtualization

The majority of the installed client base has a combination of current and recently released operating systems. Desktop applications and system events are centrally monitored and reported, and trends are analyzed and integrated into incident management systems. Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to automatically identify devices to deploy, configure, and update while maintaining device security. Mobile devices are managed by security policy provisioning (such as personal identification numbers) and remote wipe. Installation and inventory of standard corporate applications on mobile devices are manual. All mobile access to internal systems is through a proxy technology (such as a messaging system and/or selective SSL).

Device Security

Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.

Identity

& Security

Services

Identity & Access

Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.

Information Protection & Control

Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and e-mail); policy templates are used to standardize rights and control access to information. Reporting is predefined for select server and back-office waypoints.

IT Process & Compliance

The IT service portfolio is aligned with the organization; management regularly reviews how the service portfolio and strategy align, and reports costs and returns across IT services. IT policies are integrated across all IT services, enabling or restricting use of resources as appropriate. Definitions of reliability for IT services are integrated across IT services and enforceable. IT service issues and design changes are tracked by using formal processes; testing is automated where possible. IT service release processes are uniform across IT services; deployment is automated and offers self service where possible; management reviews each service for readiness to release before deployment. Service-level and operational-level agreements are integrated for IT services; management reviews operational health regularly; some tasks are automated. Processes to manage incidents are integrated across IT services via self service where appropriate. Monitoring and flexible, tenant/service reporting are aggregated across individual areas for protection against malware, protection of information, and identity and access technologies. Problem management processes are integrated across IT services, with incident management integration. The change and configuration management process is integrated across IT services; standard changes are identified across IT services and automated with self service where possible. Ownership and accountability assignments are integrated across all IT services. Risk and vulnerability analysis is integrated across all IT services; IT compliance objectives and activities are integrated across IT services and automated where possible; management regularly audits to review policy and compliance. Comprehensive service life cycle orchestration that is automated for some workloads.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide29

Phase 2: BPIO

B

S

R

D

Collaboration

Workspaces

Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices).

Portals

Publishers can direct content to specific audience targets; portals deliver a customized, targeted, or aggregated view of information to individuals based on user identity, role, and device on which content is consumed. Users get targeted information based on their profiles, their roles in the organization, and mobile devices being used. Line-of-business applications are routinely surfaced through the portal and have the capability to write securely to back-end systems and to maintain data integrity; information from multiple applications can be combined in dashboards.

Social Computing

Blogs, wikis, and podcasts are used enterprise-wide and compose a significant amount of enterprise content; communities have dedicated, actively managed sites that often are customized for specific needs, This Content is accessible through multiple mobile devices. Rating, tagging, and bookmarking are used broadly to share opinions about all kinds of content and are available from within productivity applications that are used to create content. Personal profiles are available but cannot be customized; users can publish content on personal shared sites; people can be located based on profile information; the system sorts search results for people by users’ social graphs, which can be refined by using metadata; news feeds are typically delivered through RSS or e-mail alerts.

Project Mgt

Teams plan, track, and share tasks in lists by using collaboration tools; multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.

Information access

Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.

Interactive experience and navigation

An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.

Messaging

The messaging solution includes anti-spam, anti-phishing, and multiple-engine anti-virus protection. The e-mail platform supports advanced, policy-driven message controls that include automatic application of rights protection. Secure, policy-driven access to a unified inbox from PCs, phones, and Web browsers exists inside and outside the firewall. Provisioning of user inboxes is driven by business demand, uses a single directory, and provides features based on user needs.

Unified Communications

IM/Presence

Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.

Conferencing

A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.

Voice

Voice mail is part of a unified inbox that features single storage and a unified directory; retention and protection policies are enforced by the organization; messages are available as voice or transcribed text and are accessible from PCs, phones, or Web browsers. There is an intelligent, adaptive media stack on phone and PC endpoints to enable high-quality voice communications even on unmanaged networks (such as the Internet). Call routing within an organization is based on identity and online presence. Redundant call control servers within a cluster or pool provide resilience when failure occurs at a single point.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide30

Phase 2: BPIO Continued

B

S

R

D

Content Creation and Management

Information Mgt

Traditional and new media content types are managed consistently in a single repository that has integrated workflow. Metadata is centrally managed and deployed across the business; metadata capture is simplified through preemptive suggestions, or is automated based on location and context. Web content is created, published, and managed by business owners who use appropriate publishing workflows to govern review cycles. Content is managed pervasively throughout the enterprise—albeit in diverse systems. Applicable retention schedules have been applied to all critical electronic content.

Process Efficiency

Users are empowered to create and deploy electronic forms by using visual design tools; data from forms (stored in an open format) and scanned paper-based content are managed as part of an electronic information management strategy; a framework provides leverage for integration of data from forms with line-of-business applications. The organization gains leverage from visual workflow models and declarative workflow tools to create workflow solutions that have limited integration with line-of-business applications; people can design and validate customized parallel or serial workflows visually as needed, run them manually or automatically, and monitor them in real time.

Compliance

Policy management is based on content type, location, and document libraries, and includes adherence of content used offline; an integrated solution for electronic discovery of information is in place; retention policies and holds on records are automated. All information is well managed in accordance with government and industry regulations; content can be rapidly identified and preserved, and the in-house aspect of the discovery process is managed by automated workflow; some content resulting from electronic discovery is initially refined in-house to reduce the volume of content given to external council.

Authoring

Content authoring tools support rich formatting and rich media editing, and content can be secured with rights management by users. Content is efficiently reused without loss of context across applications that have different purposes; templates are centrally manageable. Tools are available to capture notes and research gathered by using search.

Multi-Device Support

Application user interfaces are customizable at the user and organizational levels for optimal flexibility in user experience and IT control. Key applications support optimized usage scenarios; for example, Web for reach, rich client for responsiveness, and phone for mobility. Documents can be viewed and edited through optimized modes (such as PC, phone, or browser) without significant formatting or data loss.

Interoperability

User Accessibility

Productivity applications are designed to facilitate use by people who need accessibility features. Core productivity applications offer standards-based tools for users to confirm accessibility of content.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide31

Phase 2: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Users search for unstructured documents and structured reports based on metadata and content of reports. Using search on the BI portal allows users to find data, analyses, and reports, and users can launch tools for self service report generation and analysis from the search interface. Dashboards are consistently used to provide operational and strategic views of the business from real time or periodically refreshed data. BI portal experience has rich visualizations, dashboards and scorecards with full data interactivity (slicing, filtering, etc.) consistent with self service reporting and analysis tools. Users have the ability to create unique personal and/or shared views of data that are actually combinations of multiple views (i.e. mashups). IT provisions and provides access to infrastructure, statistical analysis and data mining tools, and common sanctioned data sources to Data Analyst roles to analyze business data and build models to enable future decisions, predict trends, find correlations in business attributes, etc. Data Analysts publish the results of their analyses to business users via reports, spreadsheets, charts, visualizations, etc.

Data Warehouse Management

Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed.  Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores. Adherence to stringent corporate or government regulatory compliance is a top priority. Reports are easily generated and viewed and greatly facilitate compliance audits for protection of data-at-rest and data-in-transit, and compensating controls are available.

Application Infrastructure

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide32

Phase 2: APO Continued

B

S

R

D

Custom Development

Internet Applications

Pages are dynamic and database-driven, and may use some templates for replication of content across them. Custom coding is needed to work on different browsers. Dedicated media delivery servers and standardized publishing processes are in place with some consolidation around a single media format and may include support for some social networking features. The site may use external vendors to handle delivery of live streaming broadcasts to shareholders. Enterprise portals and possibly CMS are in use to store, manage, and distribute video content. Some workflow processes may be in place and multicast may be enabled.  The site may use or integrate third-party solutions.

Component and Service Composition

Along with IT, business units are becoming suppliers of reusable assets and realize that they can empower their users by connecting services and experience, building upon the assets that the central IT team provides and by creating their own. Creation of LOB extension applications can be accomplished without a lot of custom code and through the assembly of existing components. There is a designated tool for the creation of composite LOB extension in addition to the integration with advanced developer tools. However, other tools continue to exist for different functional purposes like workflow, UI creation, etc. The organization overall realizes that services and UI needs to blend, start rationalizing which UI standard they will be driving to, and move to a point where every service has a “face” that is consumable for composing new applications. End users can share their created solutions back to the repository. Mechanisms exist to allow for ranking and rating of solutions and components. A managed central repository of all configuration items, assets, and systems provides dependency maps, reporting, and metrics for development and operations teams across the organization to manage integrations, performance, and scale.

Enterprise Integration

Use of standardized processes for data integration is at the project level and technologies are used to improve back-end integration. The business leverages an integration broker running on-premises to connect to cloud applications using adapters. Reusable integration components are developed for custom development on an ad hoc basis. Project management is centralized for application integrations.

Development Platform

The organization has selected and implemented a common set of frameworks for major application development and operating environment needs. Developer skill and use of standard frameworks is consistent. A central architecture and engineering practices group has formed with the participation of development and operations teams, and provides valuable guidance to development teams. A standard set of tools and common development approaches are used across multiple development teams in the organization. Application customization is performed through customization support offered by the application, on an isolated project basis with no standard approaches or consideration for future maintenance or integration.

Application Lifecycle Management

Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide33

Technology Guidance

Client Technologies

Microsoft

Office 2007 / 2010

Microsoft Office

Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel

2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010

Microsoft Office

InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio

2007 / Microsoft Visio 2010

Microsoft Office Groove 2007 / Microsoft SharePoint Workspace 2010

Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010Microsoft Office Project 2007 / Microsoft Project 2010Windows Phone 7.5 / 8Microsoft Office Mobile 2010Microsoft Forefront Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Microsoft FAST Search Server 2010 for SharePointWindows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL Server 2008 R2 / 2012

Microsoft Server Security

Microsoft Forefront Security for SharePoint / Microsoft Forefront Protection 2010 for SharePointMicrosoft

Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange Server

Microsoft Forefront Security for Office Communications

Server

Microsoft

Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway

2010

Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway

2010

Microsoft Forefront Identity Manager 2010 / 2010 R2

Microsoft Windows Server 2008 R2 /

2012

Microsoft System Center

Microsoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations Manager

Microsoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection Manager

Microsoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager

Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device

Manager

Microsoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager

Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service

Manager

Opalis

/ Microsoft System Center 2012

Orchestrator

Microsoft System Center 2012 App

Controller

Microsoft Desktop Optimization Pack 2011 / 2011

R2

Windows Embedded Device Manager

2011

Microsoft Windows Storage Server 2008 / 2008

R2

Windows Server

AppFabric

Microsoft

Hyper-V

Server 2008 / 2008

R2

Microsoft Virtual Desktop Infrastructure

Suite

Microsoft Office Project Server 2007 / Microsoft Project Server

2010

Microsoft Office Project Portfolio Server

2007

Microsoft

BizTalk

Server 2009 / 2010

Cloud Technologies

BPOS / Microsoft Office

365

Microsoft Exchange

Online

Microsoft SharePoint

Online

Microsoft Office Communications Online / Microsoft

Lync

Online

Microsoft Forefront Online Protection for

Exchange

Windows

Azure platform

Windows

Azure

Active Directory Access

Control

Microsoft SQL Azure

Windows

Intune

Microsoft

Office Web

Apps

Microsoft Exchange Hosted

Services

Microsoft Online Backup Service

Development

Tools

Microsoft .NET

Framework

Microsoft

Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation

Server

Microsoft Visual Studio Team System 2008 / 2010 /

11

Microsoft

Expression

Studio 3 / 4

Tools, Add-ins, Libraries, and Frameworks

Microsoft Assessment and Planning Toolkit 6.0 /

6.5

Microsoft Security Assessment

Tool

Microsoft Software Inventory Analyzer 5.0 /

5.1

Microsoft Deployment Toolkit 2010 /

2012

Windows Automated Installation

Kit

Microsoft Security Compliance Management

Toolkit

Compliance Management Libraries

2.0

Windows SDK

Data Classification

Toolkit

IT Governance, Risk and Compliance process management pack

2.0

Microsoft Windows

PowerShell 2.0

BizTalk ESB

Toolkit

Category Products

Microsoft Dynamics AX 2009 /

2012Slide34

Phase 2: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 Enterprise; Hyper-V Server 2008 R2 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 R2 Enterprise; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Opalis; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; System Center Virtual Machine Manager 2008 R2 (Offline Virtual Machine Servicing Tool 2.1); Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V)

Server Security

Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for Exchange Server; Forefront Security for Office Communications Server; Forefront Security for SharePoint; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (Web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Forefront Unified Access Gateway 2010 (Endpoint access controls); Intelligent Application Gateway 2007; Intelligent Application Gateway 2007 (Endpoint and Access Security); Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2008 R2 Enterprise (Windows Firewall, Network Policy, and Access Services); Windows Server 2012

Networking

Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)

Storage

System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2012 (Hyper-V Replica)

Device

Deployment and

Management

Device Mgt & Virtualization

Exchange Server 2007 / 2010; Exchange Server 2007 (ActiveSync); Exchange Server 2010 (ActiveSync); Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Asset Inventory Service); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Mobile Device Manager 2008; System Center Mobile Device Manager 2008 (Enrollment Auto Discovery); System Center Operations Manager 2007 R2; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Intune (Exchange ActiveSync Integration); Windows Intune (Self Service Portal); Windows Phone 7.5 / 8; Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2012 (Remote Desktop Services)

Device Security

Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010 (Network Inspection System); Internet Security and Acceleration Server 2006; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Intune (not for non-PC devices); Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Network Access Protection)

Identity

& Security

Services

Identity & Access

Forefront Identity Manager 2010 (Credential Management); Forefront Identity Manager 2010 (Policy Management); Forefront Identity Manager 2010 (User Management); Forefront Identity Manager 2010 R2; Hyper-V Server 2008 (Read-Only Domain Controller); Hyper-V Server 2008 R2 (Read-Only Domain Controller); Windows 7 / 8; Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 (Active Directory Domain Services, Read-Only Domain Controller); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Certificate Services); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Federation Services); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012

Information Protection & Control

Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Microsoft SQL Server 2008 R2; SQL Server 2012; Windows Azure; Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012

IT Process & Compliance

Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint 2007 (Lists); Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint 2010 (Lists); SharePoint Server 2010; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Visio Professional 2007 / 2010; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide35

Phase 2: BPIO

B

S

R

D

Collaboration

Workspaces

Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 / 2010; Office 2007 (Groove 2007: offline collaborative workspaces); Office 2010 (SharePoint Workspace 2010: offline collaborative workspaces); Office 365 Dedicated; Office 365 Dedicated (Dedicated is here for Hybrid); Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (offline collaborative workspaces); SharePoint Designer 2007 / 2010; SharePoint Online; SharePoint Online (access/view documents, client integration, mobile device support); SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (co-authoring); SharePoint Server 2010 (offline collaborative workspaces, Web applications and companions, mobile-device view)

Portals

Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (audience targeting); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (role-based access, audience targeting); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (audience targeting); SharePoint Online (custom code support); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (audience targeting); SharePoint Server 2010 (Business Connectivity Services); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (role-based access, audience targeting); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)

Social Computing

Office 2007; Office 2010 (content tagging within applications); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (email alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)

Project Mgt

Office 365 E1 / E2 / E3 / E4; Project 2007 / 2010; Project Server 2007 (visual reports, resource availability graphs, and budget tracking); Project Server 2010 (schedule management, financial management, time and task management); SharePoint Foundation 2010; SharePoint Online P1 / P2

Information access

FAST Search Server 2010 for SharePoint (federated search, connectors and content ingestion); FAST Search Server 2010 for SharePoint (structured data search); Office 2007; Office 2010 (Outlook: keyword tagging for email); Office 2010 (search across business data); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (federated search connectors, people search); Office SharePoint Server 2007 (federated search connectors, Search-driven applications); Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online (search federations, people search, relevance); SharePoint Online (Structured data search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, federated search connectors, people search); SharePoint Server 2010 (FAST search usage rights, federated search connectors, Search-driven applications); SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)

Interactive experience and navigation

FAST Search Server 2010 for SharePoint (faceted search, personalization, visual search); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (metadata-driven faceted search, unified search, personalization); SharePoint Online (faceted search, unified search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, metadata-driven faceted search, unified search, personalization); Windows 7 (search); Windows 8

Messaging

Exchange Hosted Encryption; Exchange Hosted Filtering; Exchange Online; Exchange Online (connects to on-premises Private Branch Exchange); Exchange Online (Forefront Online Protection for Exchange); Exchange Online (requires on-premises Rights Management Services); Exchange Online (Standard and Deskless); Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Online P1 / P2 (dependency on RMS); Exchange Server 2007 / 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Mobile 2007 / 2010; Outlook Web Access (premium experience); Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012

Unified Communications

IM/Presence

Lync 2010; Lync Online / P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; SharePoint Online; SharePoint Server 2010

Conferencing

Lync 2010; Lync Online / P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 / 2010 (integrated conferencing)

Voice

Exchange Online / P2; Exchange Server 2007 / 2010 (unified inbox); Lync 2010; Lync Online; Lync Server 2010; Office 365 E3 / E4; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 / 2010; Windows Phone 7 / 7.5

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide36

Phase 2: BPIO Continued

B

S

R

D

Content Creation and Management

Information Mgt

Office 2007; Office 2007 (document information panel); Office 2007 (integrated workflows); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 2010 (Backstage, location-based metadata defaults, automated population of metadata); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (content authoring and publishing, content staging and deployment, navigation controls, site variations); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (metadata tagging); Office SharePoint Server 2007 (out-of-the-box workflows); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (Web content editor, master pages, page layouts, controls); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online; SharePoint Online (document workspace); SharePoint Online (high-fidelity Web sites with consistent branding); SharePoint Online (metadata); SharePoint Online (out-of-the-box workflows); SharePoint Online (site manager); SharePoint Online (Web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010 (content authoring and publishing, content staging and deployment, navigation controls, site variations, high-fidelity Web sites with consistent branding); SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (metadata tagging, location-based metadata defaults, automated population of metadata); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (Web content editor, master pages, page layouts, controls)

Process Efficiency

Office 2007 (InfoPath 2007: browser-based forms, mobile forms); Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (InfoPath 2010: WCAG compliant browser forms); Office 2010 (workflow integration through Backstage); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (custom workflows); Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control); Office SharePoint Server 2007 (out-of-the-box workflows); SharePoint Designer 2007 / 2010; SharePoint Designer 2010 (visualize workflows); SharePoint Online (browser-based forms); SharePoint Online (custom workflows); SharePoint Online (form libraries); SharePoint Online (out-of-the-box workflows); SharePoint Online P1 / P2; SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control, WCAG compliant browser forms); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (reusable workflows); Visio 2007 / 2010

Compliance

Office 365 E3 / E4; Office SharePoint Server 2007 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley); SharePoint Online (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Online (support for industry standards); SharePoint Server 2010 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley)

Authoring

Office 2007; Office 2010 (contextual UI menu); Office 2010 (PowerPoint: resizing and cropping videos with 3-D effects); Office 2010 (Word: navigation pan, polished find); Office 365 E1 / E2 / E3 / E4 / K2; Office SharePoint Server 2007; SharePoint Server 2010 (document sets); SharePoint Server 2010 (rich media editing, rights management); SharePoint Server 2010 (search); Visio 2007 / 2010 (quick shapes mini toolbar, enhanced dynamic grid, page auto size, automatic alignment and layout adjustment)

Multi-Device Support

Office 2007; Office 2007(rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (PC, phone, and browser, 64-bit Office client deployment and authoring); Office 2010 (rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Mobile 2010 (view and edit documents from a mobile device); Office SharePoint Server 2007; Office Web Apps (store, edit, and share documents online); SharePoint Server 2010; SharePoint Server 2010 (Fluent UI); SharePoint Server 2010 (mobile access enhancements, view and edit documents, spreadsheets, presentations, and notebooks in the browser); Visio 2007; Visio 2010 (rich client, share diagrams with others on the Web)

Interoperability

User Accessibility

Office 2007; Office 2007 / 2010 (accessibility investments); Office 365 E1 / E2 / E3 / E4 / K1 / K2

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide37

Phase 2: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Enterprise (Excel Services); SharePoint 2010 Enterprise (Insights, Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online; SharePoint Online (Insights, Excel Services, Visio Services); SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010

Data Warehouse Management

SQL Server 2008 R2 Data Center; SQL Server 2008 R2 Enterprise; SQL Server 2008 R2 Enterprise (Fast Track, SQL Server Analysis Services, SQL Server Reporting Services); SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; SQL Server 2012 (SQL Server Analysis Services, SQL Server Reporting Service); Visual Studio 11 / 2010; Visual Studio 2008 (BI Development Studio)

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2 / 2012

Application Infrastructure

Custom Development

Internet Applications

Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Premium; Visual Studio 2010 Professional

Component and Service Composition

BizTalk ESB Toolkit; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007 (Business Data Catalog); SharePoint 2010 (Business Connectivity Services); SQL Server 2008 R2 / 2012; System Center 2007 / 2012; Windows Server AppFabric

Enterprise Integration

Microsoft.NET Framework; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Professional

Development Platform

Office Professional 2010; SQL Server 2008 R2; Visual Studio 11 / 2008; Visual Studio 2010 Professional; Visual Studio Team Foundation Server 2010; Windows SDK

Application Lifecycle Management

Office Professional 2010; Project 2010; Visual Studio 11; Visual Studio 11 Team Foundation Server; Visual Studio 2008 / 2010; Visual Studio 2010 Premium; Visual Studio 2010 Ultimate; Visual Studio Team Foundation Server 2010

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide38

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIES

Business

Driver

Category ProductReduce the carbon footprint by minimizing the environmental impact of technology

None

Measure and track internal resources and environmental impact goals

None

Support creation, management, and monitoring of compliance frameworks

None

Normalize corporate compliance with external environmental regulations

None

Respond to consumer expectations that industries take a holistic approach to sustaining the environment

Microsoft Dynamics

®

AX 2009/2012:

Use collaboration tools to share and discuss environmentally friendly products, packaging, storage, and transportation improvements to reduce the carbon footprint

Participate in business opportunities that sustain the environment

Dynamics AX 2009/2012:

Use collaboration tools to share and discuss environmentally friendly products, packaging, storage, and transportation improvements to reduce the carbon footprint

Phase 2

Category ProductsSlide39

CONCEPTUAL

ARCHITECTURE

MAPPING

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITION

CONCEPTUAL

ARCHITECTURE

Phase 2Slide40

LOGICAL

ARCHITECTURE

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

MAPPING

PHASE

DEFINITION

LOGICAL

ARCHITECTURE

Phase 2Slide41

Agenda

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability RequirementsSlide42

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Phase 3

Business

DriverNeedsBusiness CapabilitiesReduce the carbon footprint by minimizing the environmental impact of technology

Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting

Make data centers more environmentally friendly

Manage utilization of distributed IT resources such as laptops, printers, and other devices

Fully integrate telecommuting into the culture and business practices to reduce automobile and aircraft emissions

Take advantage of cloud computing to shift and consolidate resources

Provision servers for application portfolio management to lower the number of servers by consolidating applications onto fewer servers

Develop and distribute applications in the cloud with minimal resources on the premises

Proactively perform preventative maintenance and achieve other equipment improvements through automated alerts that are linked to more details about root causes, effects, and other troubleshooting data

Measure and track internal resources and environmental impact goals

Establish resource utility baselines and the means to measure and report improvements

Empower customers to make ecologically friendly choices based on the reported environmental impact of products

Track and measure the impact of teleworking

Enable executives and reporting authorities to take proactive measures when certain trends begin to change to enable analysis and understanding of the root cause and effects, and to share details and best practices

Share and collaborate on product, packaging, storage, and transportation improvement opportunities internally and throughout the supply chain, and in business modeling and simulation tools

Define performance levels for telecommuters and measure the outcomes in real time

Assign role-based key performance indicators (KPIs) for key business metrics that can be monitored for productivity

Support creation, management, and monitoring of compliance frameworks

Give businesses incentives to comply with regulations, reduce carbon, save energy, and have workers commute less frequently

Proactively monitor compliance metrics, triggered events, and alerts when compliance is compromised, and give prescriptive guidance about how to mitigate future riskSlide43

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

Phase 3

Business

DriverNeedsBusiness CapabilitiesNormalize corporate compliance with external environmental regulations

Ensure that organizations are informed and complying with environmental sustainability regulations

Define and convert to environmentally sustainable or Green processes that are agile and adaptable to future regulations

Provide advanced data visualization to make it easier for users to understand and respond to new compliance requirements

Optimize compliance processes by managing initiatives, monitoring risks, and delivering alerts to appropriate people to raise environmental awareness

Respond to consumer expectations that industries take a holistic approach to sustaining the environment

Establish and support a secure and continuous work environment to reduce environmental impact related to travel and commuting

Make data centers more environmentally friendly

Manage utilization of distributed IT resources such as laptops, printers, and other devices

Update the infrastructure for next-generation workers by using the cost-savings gained by enabling remote workers

Safeguard information when workers access sensitive data from remote locations

Collect customer feedback and suggestions for improvement to the organization's environmental initiatives

Analyze sustainability performance data, plans, and targets to increase performance transparency and mitigate risk

Measure and report on metrics related to Green initiatives and identify opportunities to stimulate more sustainable processes to improve customer relationships

Participate in business opportunities that sustain the environment

Establish resource utility baselines and the means to measure and report improvements

Empower customers to make ecologically friendly choices based on the reported environmental impact of products

Track and measure the impact of teleworking

Provide social computing capabilities within and across the enterprise, including suppliers and customers, to collect feedback and gather suggestions for improvement

Enable ongoing optimization and alignment of processes with corporate sustainability guidelines by analyzing the carbon footprint and environmental impact of suppliers to maintain a resilient and sustainable supply chain

Enable real-time availability of operational information across the organization and provide the ability to compare data with competitors and analyze trendsSlide44

Phase 3: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

Resource provisioning and deprovisioning occurs dynamically and is elastic. Workloads are relocated dynamically. Majority of production server resources are virtualized. Resource pooling implementation supports compliance and cost management strategies, such as Auditing and Reporting, Policy Management, Metered Usage, Multi-Tenancy and Process Automation. Service performance monitoring with automated remediation and centralized view across all SLAs; consolidated view across all management tools.

Server Security

Malware protection is centrally managed across server operating systems within organizations, including host firewall, host IPS/vulnerability shielding, and quarantine, with defined SLAs. Protection is deployed and centrally managed for all applications and services. Secure remote access is integrated with quarantine for compliance with corporate policy.

Networking

Redundant Domain Name System servers exist on a separate network to provide fault tolerance and isolation, including ability to do zone transfer across boundaries.

Storage

Critical data is backed up by taking snapshots using a centralized, application-aware system.

Device

Deployment and Management

Device Mgt & Virtualization

Applications are distributed on demand for the majority of traditional desktop environments and productivity applications. Software installed in physical and virtual environments is identified and categorized automatically; there is a single location to track license and contract details and to manage the software allocation; inventory is reconciled quarterly. Certificate provisioning and authorization (for example, 802.1x or Secure Sockets Layer) is in place for mobile devices. Mobile phones are used for over-the-air synchronization with e-mail, calendar, and contacts. Mobile devices are managed by enforceable application and hardware policies (such as device encryption and hardware access). Installation and inventory of standard corporate applications on mobile devices are managed automatically through integrated software distribution tools. Mobile access to internal systems is granted through a virtual private network (IP Security or SSL).

Device Security

Protection against malware is centrally managed for desktop systems, laptops, and non-PC devices; desktop systems and laptops include a host firewall, host intrusion prevention system or vulnerability shield, and quarantine.

Identity & Security

Services

Identity & Access

Provisioning and de-provisioning of user and super-user accounts, certificates, and/or multi-factor authentication is automated. Centralized IT offering of Federation services. Multiple Federation and trust relations between separate organizations 1 to 1 relationship. Multi-factor and certificate-based authentication are applied in some scenarios, such as remote access across boundaries (such as On Prem and Cloud). Self service password resets supported. A centralized, group/role based access policy is defined for business resources, applications, and information resources, managed through industry accepted processes. A scalable directory that is integrated and automatically synchronizes with all remaining directories across multiple geographies and isolated domains for all applications with connectivity to cloud when applicable.

Information Protection & Control

Persistent information protection helps to enforce policy on sensitive data across boundaries, including data on mobile devices. Reporting for server, back-office, and end-user waypoints; analysis capabilities exist to provide investigation of critical incidents.

IT Process & Compliance

IT policies initiate automated remediation. Incident Management supported by automated remediation. Risks and vulnerabilities are analyzed across all IT services against developed models; compliance objectives and activities are automated, and then updated automatically based on changes to IT policies.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide45

Phase 3: BPIO

B

S

R

D

Collaboration

Workspaces

Workspaces are centrally managed, customizable, and reusable, and provide users the capability to collaborate through Web browsers and mobile devices; offline synchronization is supported. Team members can simultaneously author, edit, and review content across Clients (including Devices).

Portals

Users can publish content to extranet and Internet sites with the same systems, device form-factors, and methods they use to publish content to the intranet; in addition, users can publish content that includes line-of-business data to portals from within business and productivity applications. Portals support collaboration and information sharing across extranet and Internet sites in a hybrid on-premises and Web (cloud)-based infrastructure and through federated relationships with trusted partners.

Social Computing

Social graph data, user behavior, and social feedback are analyzed to recommend people, groups, and assets; third-party social feeds are exposed within enterprise tools such as personal information management clients; news feeds are generated from relevant line-of-business systems; feeds can be filtered and tuned by end users to improve relevance. social networking is integrated into the main experience of the end-user in an enterprise & is seamless across mobile devices.

Project Mgt

Teams plan, track, and share tasks in lists by using collaboration tools; multiple baselines exist. Teams can upload and share documents and files; project workspaces are integrated with desktop productivity applications. Portfolios are analyzed in graphical views that include status, resource allocations, and financial details.

Information access

Unstructured content from the Web, collaborative and content-managed data repositories, databases, and line-of-business applications is indexed; indexing processes incorporate browsing by people and ranking of expertise. A single platform provides an organization-wide search experience; structured data is incorporated and exposed in search-driven applications.

Interactive experience and navigation

An advanced interactive search experience incorporates faceted information based on extracted metadata and other user experience elements to guide users; the search experience is unified across desktop systems, mobile devices, servers, and Internet searches.

Messaging

Provisioning of user inboxes occurs automatically based on needs of individual users and spans on-premises and off-premises messaging environments.

Unified Communications

IM/Presence

Online presence information and contextual “click to communicate” are integrated into the enterprise productivity and collaboration platform.

Conferencing

A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries. A secure, unified conferencing platform that enables rich audio, video, and data collaboration is managed by IT and is available from enterprise productivity applications; the platform also has a single user interface, a single directory, and is available across organizational boundaries.

Voice

Server pools that are split across data centers or replicated provide resilience to data centers when disaster occurs.

Content Creation and Management

Information Mgt

Centrally managed workspaces support a hybrid on-premises and Web (cloud)-based infrastructure; business content is integrated with automated life-cycle management that includes content creation, discoverability, archiving, and retirement.

Process Efficiency

The organization orchestrates processes with advanced custom workflows, and deploys and integrates line-of-business applications; human and system workflows are integrated for orchestration, exception handling, and automation; people can design workflows by using visual tools, and can reuse workflow patterns in similar scenarios.

Compliance

All information created by the organization is managed throughout the content life cycle; policy and compliance are consistently enforced across traditional content, Web content, e-mail, social content, and semi-structured information and across devices. Content that results from electronic discovery can be quickly refined to produce relevant information for use as evidence in court; automated workflow manages the entire discovery process.

Authoring

Content authoring tools deliver advanced formatting. Rich media can be centrally stored, tagged, managed, and made easily available for use in building content deliverables. Ideas, notes, and research gathered across Web productivity tools and conversations are easy to find and share.

Multi-Device Support

Underlying capabilities such as instant messaging, communications, workflow, collaboration, and content management are available in each delivery mode as appropriate.

Interoperability

User Accessibility

Productivity applications meet guidelines for information and content accessibility in recognized accessibility standards such as Section 508 and Web Content Accessibility Guidelines (WCAG) 2.0 for both PC and web. New sites meet standards guidelines for supporting assistive technologies in the browser.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide46

Phase 3: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Data Analysts use powerful data management workbench with integrated access to tools for data preparation, cleansing, multi-variate analysis, and a sophisticated set of data mining algorithms with extensibility and tuning options. Data Analysts can easily publish their findings and data sets for access by business users.

Data Warehouse Management

Real-time information is available to mission-critical applications, analytics, and reporting systems. Mature governance processes with integrated business rules are consistently applied for centralized data and data loading. EDW, data marts, and supporting storage and infrastructure are centrally managed. EDW serves as the hub that integrates data marts and enables a single view of data and data sets. EDW uses star/snowflake schemas with shared, conformed dimensions to simplify reporting and improve performance. Hardware architecture is balanced to optimize performance. The EDW covers all data from all transactional systems and is optimized for reporting and analysis using business intelligence semantic models (such as OLAP) that further consolidate data. The EDW is primarily fed from departmental data marts, but may be fed directly from key transactional systems to improve data freshness. Master data management of the EDW and data marts is centrally governed, although implementation, operations, and maintenance is still distributed. Data warehouse and data mart resources are explicitly governed.  Audit information is available for performance, history, and forensic information. An IT-managed BI environment and applications at the department level are aligned with the enterprise data warehouse (EDW) environment and applications. IT proactively builds, maintains, and manages key reports and analysis models that are used regularly across the business. IT designs, implements, and manages semantic models (such as OLAP) and data schemas optimized for managed and self-service reporting and analysis.

Big Data

Information Services and Marketplaces

Database and LOB Platform

Transaction Processing

Data Management

Data governance with documented, standardized policies and processes are established and automated for maintaining data consistency and security, but not necessarily optimized. Data access controls are consistently implemented and applied based on data classification. Centrally administered cryptography is used and audited for protection of data-at-rest and data-in-transit. A self-service interface exists for DBAs and/or authorized users to manage security. An information asset inventory and relationship map is able to predict impacts of changes in some areas. Metadata and taxonomies are defined, implemented, and formally managed in one or more repositories with more reliance upon policy-based management to ensure proper configuration and adherence to policies. Business has begun to consolidate data, management plans, and policies for consistency across information stores. Adherence to stringent corporate or government regulatory compliance is a top priority. Reports are easily generated and viewed and greatly facilitate compliance audits for protection of data-at-rest and data-in-transit, and compensating controls are available.

Application Infrastructure

Custom Development

Internet Applications

Site is designed using standards-oriented web technologies (HTML, CSS, JavaScript, etc.) and rich Internet functionality where appropriate. Sites use template-driven dynamic pages, with little to no replication of code, externalized styling and design with master pages and/or CSS that work seamlessly across any browser with little or no custom coding per browser. Content is supplied through a content management system (CMS) and there is provisioning for rich content such as video. Pages are tested against multiple browsers and versions. Pages are checked to verify that keywords are picked up by search engine spiders and other work is done for effective SEO.

Component and Service Composition

Along with IT, business units are becoming suppliers of reusable assets and realize that they can empower their users by connecting services and experience, building upon the assets that the central IT team provides and by creating their own. Creation of LOB extension applications can be accomplished without a lot of custom code and through the assembly of existing components. There is a designated tool for the creation of composite LOB extension in addition to the integration with advanced developer tools. However, other tools continue to exist for different functional purposes like workflow, UI creation, etc. The organization overall realizes that services and UI needs to blend, start rationalizing which UI standard they will be driving to, and move to a point where every service has a “face” that is consumable for composing new applications. End users can share their created solutions back to the repository. Mechanisms exist to allow for ranking and rating of solutions and components. A managed central repository of all configuration items, assets, and systems provides dependency maps, reporting, and metrics for development and operations teams across the organization to manage integrations, performance, and scale.

Enterprise Integration

Applications leverage an application communication infrastructure deployed in operations that is actively managed and has dynamic routing capabilities. Application integrations leverage standard application messaging protocols and infrastructure to connect various applications running on-premises and in the cloud, connecting mission-critical data and transactions across enterprise applications. Centralized data integration strategies and tools are used across the enterprise.

Development Platform

Developed applications extend line-of-business (LOB) systems (at UX level and mid-tier), extending LOB business logic. IT manages a service-based infrastructure of composite applications that connect and surface best-of-breed LOB systems.

Application Lifecycle Management

Consistent, iterative, well-documented, and cross-functional processes exist across the application life cycle. Project estimates consider historical data. High transparency exists within self-directed teams, cross-team transparency, and stakeholder engagement. Project managers track status via centralized tools. Issue tracking is well integrated with change management. Test-driven development is accepted. Applications are designed for testability, with architectural and layer verification and validation. Agile testing is integrated tightly with agile development. Users and stakeholders are engaged on an ad hoc basis. Unit testing, static analysis, and profiling are used regularly. An integrated platform exists between development and operations for application monitoring, incident reporting and management, actionable defect/incident data from monitored applications, communication through support to development teams, and ubiquitous visibility into issue resolution status.

MAPPING

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITIONSlide47

Technology Guidance

Client Technologies

Microsoft

Office 2007 / 2010

Microsoft Office

Outlook 2007 / Microsoft Outlook 2010, Microsoft Office Word 2007 / Microsoft Word 2010, Microsoft Office Excel

2007 / Microsoft Excel 2010, Microsoft Office PowerPoint 2007 / Microsoft PowerPoint 2010

Microsoft Office

InfoPath 2007 / Microsoft InfoPath 2010Microsoft Office Visio

2007 / Microsoft Visio 2010

Microsoft Office Groove 2007 / Microsoft SharePoint Workspace 2010

Microsoft Office SharePoint Designer 2007 / Microsoft SharePoint Designer 2010Microsoft Office OneNote 2007 / Microsoft OneNote 2010Microsoft Office Project 2007 / Microsoft Project 2010Windows Phone 7.5 / 8Microsoft Office Mobile 2010Microsoft Forefront Endpoint Protection 2010 / Microsoft System Center 2012 Endpoint ProtectionWindows 7 / 8Microsoft Office Communicator 2007 R2 / Microsoft Lync 2010Microsoft Office Live Meeting 2007 Server TechnologiesMicrosoft Office SharePoint Server 2007 / Microsoft SharePoint Server 2010Microsoft FAST Search Server 2010 for SharePointWindows SharePoint Services 3.0 / Microsoft SharePoint Foundation 2010Microsoft Exchange Server 2007 / 2010Microsoft Office Communications Server 2007 R2 / Microsoft Lync Server 2010Microsoft SQL

Server 2008 R2 / 2012

Microsoft Server Security

Microsoft Forefront Security for SharePoint / Microsoft Forefront Protection 2010 for SharePoint

Microsoft

Forefront Security for Exchange Server / Microsoft Forefront Protection 2010 for Exchange

Server

Microsoft Forefront Security for Office Communications

Server

Microsoft

Internet Security and Acceleration Server 2006 / Microsoft Forefront Threat Management Gateway

2010

Microsoft Intelligent Application Gateway 2007 / Microsoft Forefront Unified Access Gateway

2010

Microsoft Forefront Identity Manager 2010 / 2010 R2

Microsoft Windows Server 2008 R2 /

2012

Microsoft System Center

Microsoft System Center Operations Manager 2007 R2 / Microsoft System Center 2012 Operations Manager

Microsoft System Center Data Protection Manager 2010 / Microsoft System Center 2012 Data Protection Manager

Microsoft System Center Configuration Manager 2007 R3 / Microsoft System Center 2012 Configuration Manager

Microsoft System Center Mobile Device Manager 2008 / Microsoft System Center 2012 Mobile Device

Manager

Microsoft System Center Virtual Machine Manager 2008 R2 / Microsoft System Center 2012 Virtual Machine Manager

Microsoft System Center Service Manager 2010 / Microsoft System Center 2012 Service Manager

Opalis

/ Microsoft System Center 2012

Orchestrator

Microsoft

System Center 2012 App

Controller

Microsoft Desktop Optimization Pack 2011 / 2011

R2

Windows Embedded Device Manager

2011

Microsoft Windows Storage Server 2008 / 2008

R2

Windows Server

AppFabric

Microsoft

Hyper-V

Server 2008 / 2008

R2

Microsoft Virtual Desktop Infrastructure

Suite

Microsoft Office Project Server 2007 / Microsoft Project Server

2010

Microsoft Office Project Portfolio Server

2007

Microsoft

BizTalk

Server 2009 / 2010

Cloud Technologies

BPOS / Microsoft Office

365

Microsoft Exchange

Online

Microsoft SharePoint

Online

Microsoft Office Communications Online / Microsoft

Lync

Online

Microsoft Forefront Online Protection for Exchange

Windows Azure platform

Windows Azure

Windows Azure

AppFabric

Active

Directory Access Control

Microsoft SQL Azure

Windows

Intune

Microsoft

Office Web

Apps

Microsoft Exchange Hosted

Services

Microsoft Online Backup Service

Development

Tools

Microsoft .NET

Framework

Microsoft

Visual Studio 2010 Team Foundation Server / Microsoft Visual Studio 11 Team Foundation

Server

Microsoft Visual Studio Team System 2008 / 2010 /

11

Microsoft

Expression

Studio 3 / 4

Tools, Add-ins, Libraries, and Frameworks

Microsoft Assessment and Planning Toolkit 6.0 /

6.5

Microsoft Security Assessment

Tool

Microsoft Software Inventory Analyzer 5.0 /

5.1

Microsoft Deployment Toolkit 2010 /

2012

Microsoft Application Virtualization 4.5 / 4.6

Windows Automated Installation

Kit

Microsoft Security Compliance Management

Toolkit

Compliance Management Libraries

2.0

Windows SDK

Data Classification

Toolkit

IT Governance, Risk and Compliance process management pack

2.0

Microsoft Windows

PowerShell 2.0

BizTalk ESB

Toolkit

Data Mining Add-ins for Microsoft Office

Category Products

Microsoft Dynamics AX 2009 /

2012

Bing MapsSlide48

Phase 3: Core IO

B

S

R

D

Datacenter Mgt

and Virtualization

Data Center Mgt & Virtualization

Compliance Management Libraries / 2.0; Data Classification Toolkit; Hyper-V Server 2008 / 2008 R2; Hyper-V Server 2008 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 Enterprise; Hyper-V Server 2008 R2 (Mixed OS Virtualization, Branch Office Consolidation); Hyper-V Server 2008 R2 Enterprise; IT Governance, Risk and Compliance process management pack / 2.0; Microsoft Assessment and Planning Toolkit 6.0 / 6.5; Microsoft Deployment Toolkit 2010 / 2012; Opalis; Security Compliance Manager / 2.x; Software Asset Management; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; System Center Virtual Machine Manager 2008 R2 (Offline Virtual Machine Servicing Tool 2.1); Windows Automated Installation Kit; Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Hyper-V); Windows Server 2008 R2 (Hyper-V, Clustering, and Network Load Balancing); Windows Server 2008 R2 (Windows Deployment Services); Windows Server 2008 R2 Enterprise / Datacenter; Windows Server 2008 R2 Enterprise / Datacenter (Hyper-V)

Server Security

Forefront Endpoint Protection 2010; Forefront Protection 2010 for Exchange Server; Forefront Protection 2010 for SharePoint; Forefront Security for Exchange Server; Forefront Security for Office Communications Server; Forefront Security for SharePoint; Forefront Threat Management Gateway 2010 (Virtual Private Network); Forefront Threat Management Gateway 2010 (web antivirus/anti-malware protection, Network Inspection System); Forefront Unified Access Gateway 2010; Forefront Unified Access Gateway 2010 (Endpoint access controls); Intelligent Application Gateway 2007; Intelligent Application Gateway 2007 (Endpoint and Access Security); Internet Security and Acceleration Server 2006 (Multi-Networking); Internet Security and Acceleration Server 2006 (Virtual Private Network); System Center 2012 Endpoint Protection; Windows Azure; Windows Server 2008 R2 (Windows Firewall with Advanced Security); Windows Server 2008 R2 Enterprise (Network Policy and Access Services); Windows Server 2008 R2 Enterprise (Windows Firewall, Network Policy, and Access Services); Windows Server 2012

Networking

Windows Azure; Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Domain Name System server); Windows Server 2008 R2 (Dynamic Host Configuration Protocol server)

Storage

System Center 2012 Data Protection Manager; System Center Data Protection Manager 2010; Windows Server 2012 (Hyper-V Replica)

Device Deployment and Management

Device Mgt & Virtualization

Application Virtualization 4.5; Application Virtualization 4.6; Exchange Server 2007 / 2010; Exchange Server 2007 / 2010 (ActiveSync); Microsoft Deployment Toolkit 2010 / 2012; Microsoft Desktop Optimization Pack 2011 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 (Desktop Error Monitoring); Microsoft Desktop Optimization Pack 2011 R2 (Advanced Group Policy Management); Microsoft Desktop Optimization Pack 2011 R2 (Application Virtualization); Microsoft Desktop Optimization Pack 2011 R2 (Desktop Error Monitoring); Microsoft Enterprise Desktop Virtualization; Software Asset Management; System Center 2012 Configuration Manager; System Center 2012 Configuration Manager (Asset Intelligence); System Center 2012 Mobile Device Manager; System Center 2012 Operations Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Configuration Manager 2007 R3 (Asset Intelligence); System Center Mobile Device Manager 2008; System Center Mobile Device Manager 2008 (Enrollment Auto Discovery); System Center Operations Manager 2007 R2; Virtual Desktop Infrastructure Suite; Windows 7 / 8; Windows Automated Installation Kit; Windows Azure; Windows Embedded Device Manager 2011; Windows Intune; Windows Intune (applications only); Windows Intune (Exchange ActiveSync Integration); Windows Phone 7.5 / 8; Windows Server 2008 R2 (Remote Desktop Services); Windows Server 2008 R2 (Windows Certificate server); Windows Server 2012; Windows Server 2012 (Remote Desktop Services)

Device Security

Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010 (Network Inspection System); Internet Security and Acceleration Server 2006; System Center 2012 Endpoint Protection; Windows 7 (Firewall); Windows 8; Windows Intune; Windows Intune (not for non-PC devices); Windows Server 2008 R2 / 2012; Windows Server 2008 R2 (Network Access Protection)

Identity

& Security

Services

Identity & Access

Forefront Identity Manager 2010 (Credential Management); Forefront Identity Manager 2010 (Policy Management); Forefront Identity Manager 2010 (User Management); Forefront Identity Manager 2010 R2; Hyper-V Server 2008 (Read-Only Domain Controller); Hyper-V Server 2008 R2 (Read-Only Domain Controller); Windows 7 / 8; Windows Azure; Windows Azure (Active Directory Access Control); Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2008 R2 (Active Directory Domain Services, Group Policy); Windows Server 2008 R2 (Active Directory Domain Services, Read-Only Domain Controller); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Certificate Services); Windows Server 2008 R2 Enterprise / Datacenter (Active Directory Federation Services); Windows Server 2008 R2 Standard (Active Directory Lightweight Directory Services, WS-Federation, WS-Trust); Windows Server 2012

Information Protection & Control

Forefront Threat Management Gateway 2010; Internet Security and Acceleration Server 2006; Microsoft SQL Server 2008 R2; SQL Server 2012; System Center 2012 Operations Manager; System Center Operations Manager 2007 R2; Windows Phone 7.5 / 8; Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012

IT Process & Compliance

Compliance Management Libraries / 2.0; Data Classification Toolkit; Forefront Endpoint Protection 2010; Forefront Threat Management Gateway 2010; Hyper-V Server 2008 / 2008 R2; Internet Security and Acceleration Server 2006; IT Governance, Risk and Compliance process management pack; IT Governance, Risk and Compliance process management pack 2.0; Microsoft Security Assessment Tool; Office Project Portfolio Server 2007 (prioritize and evaluate competing investments); Office Project Professional 2007; Office Project Server 2007; Office SharePoint 2007 (Lists); Office SharePoint Server 2007; Opalis; PowerShell 2.0; Project Professional 2010; Project Server 2010; Security Compliance Manager / 2.x; SharePoint 2010 (Lists); SharePoint Server 2010; System Center 2012 App Controller; System Center 2012 Configuration Manager; System Center 2012 Data Protection Manager; System Center 2012 Endpoint Protection; System Center 2012 Operations Manager; System Center 2012 Orchestrator; System Center 2012 Service Manager; System Center 2012 Virtual Machine Manager; System Center Configuration Manager 2007 R3; System Center Data Protection Manager 2010; System Center Operations Manager 2007 R2; System Center Service Manager 2010; System Center Virtual Machine Manager 2008 R2; Visio Professional 2007 / 2010; Windows Azure; Windows Server 2008 R2 (Active Directory Domain Services); Windows Server 2012

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide49

Phase 3: BPIO

B

S

R

D

Collaboration

Workspaces

Exchange Server 2007 / 2010; Lync 2010; Lync Server 2010; Office 2007 / 2010; Office 2007 (Groove 2007: offline collaborative workspaces); Office 2010 (SharePoint Workspace 2010: offline collaborative workspaces); Office 365 Dedicated; Office 365 Dedicated (Dedicated is here for Hybrid); Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Domain Services integration with SharePoint); Office SharePoint Server 2007 (offline collaborative workspaces); SharePoint Designer 2007 / 2010; SharePoint Online; SharePoint Online (access/view documents, client integration, mobile device support); SharePoint Server 2010 (Active Directory Domain Services integration with SharePoint); SharePoint Server 2010 (co-authoring); SharePoint Server 2010 (offline collaborative workspaces, web applications and companions, mobile-device view)

Portals

Office 365 Dedicated; Office 365 Dedicated (LOB Data); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (Active Directory Federation Services integration with SharePoint); Office SharePoint Server 2007 (audience targeting); Office SharePoint Server 2007 (content authoring and publishing); Office SharePoint Server 2007 (out-of-the-box workflows, My Sites); Office SharePoint Server 2007 (role-based access, audience targeting); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (widgets, search); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (out-of-the-box content publishing workflows); SharePoint Designer 2010 (out-of-the-box content publishing workflows); SharePoint Online (audience targeting); SharePoint Online (content authoring and publishing); SharePoint Online (custom code support); SharePoint Online (extranet collaboration); SharePoint Online (My Sites, standard workflows, site search); SharePoint Online (site manager); SharePoint Online (site search); SharePoint Online P1 / P2; SharePoint Server 2010 (Active Directory Federation Services integration with SharePoint); SharePoint Server 2010 (audience targeting); SharePoint Server 2010 (Business Connectivity Services); SharePoint Server 2010 (content authoring and publishing); SharePoint Server 2010 (out-of-the-box workflows, My Sites); SharePoint Server 2010 (role-based access, audience targeting); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (widgets, search)

Social Computing

Office 2007; Office 2010 (content tagging within applications); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications); Office SharePoint Server 2007 (My Sites, RSS content syndication, email alerts and notifications, social networks); Office SharePoint Server 2007 (People Search, Personal Profiles, Dynamically updated profiles using Active Directory Service and LDAP Directories or LOB systems); Office SharePoint Server 2007 (wikis, blogs, discussion boards, customized sites); SharePoint Online (email alerts and notifications, RSS content syndication, My Sites); SharePoint Online (surveys, blogs, wikis); SharePoint Online (User Profile Import, People Search, Social Networking Web); SharePoint Online P1 / P2; SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications); SharePoint Server 2010 (My Sites, RSS content syndication, email alerts and notifications, social networks); SharePoint Server 2010 (People Search, Personal Profiles, Dynamically updated profiles using Active Directory Service and LDAP Directories or LOB systems); SharePoint Server 2010 (rating, tagging, bookmarks, keywords, comments); SharePoint Server 2010 (wikis, blogs, discussion boards, customized sites)

Project Mgt

Office 365 E1 / E2 / E3 / E4; Project 2007 / 2010; Project Server 2007 (visual reports, resource availability graphs, and budget tracking); Project Server 2010 (schedule management, financial management, time and task management); SharePoint Foundation 2010; SharePoint Online P1 / P2

Information access

FAST Search Server 2010 for SharePoint (federated search, connectors and content ingestion); FAST Search Server 2010 for SharePoint (structured data search); Office 2007; Office 2010 (Outlook: keyword tagging for email); Office 2010 (search across business data); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (federated search connectors, people search); Office SharePoint Server 2007 (federated search connectors, Search-driven applications); Office SharePoint Server 2007 (out-of-the-box indexing connectors, search filters); SharePoint Online (search across enterprise content sources); SharePoint Online (search federations, people search, relevance); SharePoint Online (Structured data search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, federated search connectors, people search); SharePoint Server 2010 (FAST search usage rights, federated search connectors, Search-driven applications); SharePoint Server 2010 (out-of-the-box indexing connectors, search filters)

Interactive experience and navigation

FAST Search Server 2010 for SharePoint (faceted search, personalization, visual search); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007 (metadata-driven faceted search, unified search, personalization); SharePoint Online (faceted search, unified search); SharePoint Online P1 / P2; SharePoint Server 2010 (FAST search usage rights, metadata-driven faceted search, unified search, personalization); Windows 7 (search); Windows 8

Messaging

Exchange Hosted Filtering; Exchange Online; Exchange Online (connects to on-premises Private Branch Exchange); Exchange Online (Standard and Deskless); Exchange Online (Forefront Online Protection for Exchange); Exchange Online (requires on-premises Rights Management Services); Exchange Online Kiosk; Exchange Online P1 / P2; Exchange Online P1 / P2 (dependency on RMS); Exchange Server 2007 / 2010; Forefront Protection 2010 for Exchange Server; Forefront Security for Exchange Server; Office 365 E1 / E2 / E3 / E4 / K1 / K2; Outlook 2007 / 2010; Outlook Mobile 2007 / 2010; Outlook Web Access (premium experience); Windows Server 2008 R2 (Active Directory Rights Management Services); Windows Server 2012

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide50

Phase 3: BPIO Continued

B

S

R

D

Unified Communications

IM/Presence

Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office SharePoint Server 2007; SharePoint Online; SharePoint Server 2010

Conferencing

Lync 2010; Lync Online; Lync Online P1 / P2; Lync Server 2010; Office 365 E1 / E2 / E3 / E4; Office Communications Server 2007 R2; Office Communicator 2007 R2; Office Live Meeting 2007; Outlook 2007 / 2010 (integrated conferencing)

Voice

Exchange Online / P2; Exchange Server 2007 2010 (unified inbox); Lync 2010; Lync Online; Lync Server 2010; Office 365 E3 / E4; Office 365 E4 (Requires On-Prem Infrastructure and Lync Server 2010); Office Communications Online; Office Communications Server 2007 R2; Office Communicator 2007 R2; Outlook 2007 / 2010; Windows Phone 7 / 7.5

Content Creation and Management

Information Mgt

Office 2007; Office 2007 (document information panel); Office 2007 (integrated workflows); Office 2010 (Backstage); Office 2010 (Backstage, auto discover document repository); Office 2010 (Backstage, location-based metadata defaults, automated population of metadata); Office 365 Dedicated; Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; Office SharePoint Server 2007 (content authoring and publishing, content staging and deployment, navigation controls, site variations); Office SharePoint Server 2007 (document workspaces); Office SharePoint Server 2007 (metadata capture); Office SharePoint Server 2007 (metadata tagging); Office SharePoint Server 2007 (out-of-the-box workflows); Office SharePoint Server 2007 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); Office SharePoint Server 2007 (web content editor, master pages, page layouts, controls); SharePoint Designer 2007 / 2010; SharePoint Designer 2007 (SharePoint site customization, intuitive design interface); SharePoint Designer 2010 (SharePoint site customization, intuitive design interface); SharePoint Online; SharePoint Online (document workspace); SharePoint Online (high-fidelity websites with consistent branding); SharePoint Online (hybrid workspaces, automatic life-cycle management); SharePoint Online (metadata); SharePoint Online (out-of-the-box workflows); SharePoint Online (site manager); SharePoint Online (web content editor, master pages, page layouts, controls); SharePoint Online P1 / P2; SharePoint Server 2010; SharePoint Server 2010 (content authoring and publishing, content staging and deployment, navigation controls, site variations, high-fidelity websites with consistent branding); SharePoint Server 2010 (document workspace); SharePoint Server 2010 (metadata capture); SharePoint Server 2010 (metadata tagging, location-based metadata defaults, automated population of metadata); SharePoint Server 2010 (out-of-the-box workflows); SharePoint Server 2010 (SharePoint site administration, Active Directory Domain Services integration with SharePoint, audit trail); SharePoint Server 2010 (web content editor, master pages, page layouts, controls)

Process Efficiency

Office 2007 (InfoPath 2007: browser-based forms, mobile forms); Office 2007 (InfoPath 2007: form templates); Office 2007 (workflow integration); Office 2010 (InfoPath 2010: form templates); Office 2010 (InfoPath 2010: WCAG compliant browser forms); Office 2010 (workflow integration through Backstage); Office 365 Dedicated; Office 365 E3 / E4; Office SharePoint Server 2007 (advanced workflows, LOB integration); Office SharePoint Server 2007 (custom workflows); Office SharePoint Server 2007 (form libraries, forms development environment, forms solutions repository); Office SharePoint Server 2007 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control); SharePoint Designer 2007 / 2010; SharePoint Designer 2010 (visualize workflows); SharePoint Online (browser-based forms); SharePoint Online (custom code workflows); SharePoint Online (custom workflows); SharePoint Online (form libraries); SharePoint Online P2; SharePoint Server 2010 (advanced workflows, LOB integration, reusable workflows); SharePoint Server 2010 (form libraries, forms development environment, forms solutions repository, form layout templates); SharePoint Server 2010 (forms integrated with LOB systems/processes, browser-based forms, mobile forms, centralized forms management and control, WCAG compliant browser forms); SharePoint Server 2010 (reusable workflows); Visio 2007 / 2010; Visual Studio 2008 / 2010

Compliance

Office 2007; Office 2010 (cryptography next-generation (CNG) digitally signed content); Office 365 E3 / E4; Office SharePoint Server 2007 (embedding records management policies into the full document life cycle); Office SharePoint Server 2007 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley); Office SharePoint Server 2007 (support for industry standards: Dublin Core, Sarbanes-Oxley, automated workflows); SharePoint Online (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Online (records management throughout the content life cycle); SharePoint Online (support for industry standards); SharePoint Server 2010 (embedding records management policies into the full document life cycle); SharePoint Server 2010 (information rights management, retention and auditing policies, document retention and expiration policies, legal holds, retention schedule); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley); SharePoint Server 2010 (support for industry standards: Dublin Core, Sarbanes-Oxley, automated workflows)

Authoring

Office 2007; Office 2010 (contextual UI menu); Office 2010 (OneNote: wiki linking, navigation bar, search; Word: navigation pan, polished find; SharePoint integration); Office 2010 (PowerPoint: resizing and cropping videos with 3-D effects); Office 365 E3 / E4; Office SharePoint Server 2007; SharePoint Server 2010 (digital asset management including thumbnails, metadata, tagging, and ratings for images as well as video streaming); SharePoint Server 2010 (document sets); SharePoint Server 2010 (web publishing); Visio 2007; Visio 2007 / 2010 (quick shapes mini toolbar, enhanced dynamic grid, page auto size, automatic alignment and layout adjustment); Visio 2010 (share diagrams with others on the web)

Multi-Device Support

Exchange Server 2007 / 2010; Lync 2010 (instant messaging); Lync Server 2010 (instant messaging); Office 2007; Office 2007(rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 2010 (Fluent UI); Office 2010 (PC, phone, and browser, 64-bit Office client deployment and authoring); Office 2010 (rendering fidelity investments, File Round-tripping to Phone, encrypted document integrity check); Office 365 E1 / E2 / E3 / E4 / K1 / K2; Office Communications Server 2007 R2 (instant messaging); Office Communicator 2007 R2 (instant messaging); Office Mobile 2010 (view and edit documents from a mobile device); Office SharePoint Server 2007; Office Web Apps (store, edit, and share documents online); SharePoint Server 2010; SharePoint Server 2010 (Fluent UI); SharePoint Server 2010 (mobile access enhancements, view and edit documents, spreadsheets, presentations, and notebooks in the browser); Visio 2007; Visio 2010 (rich client, share diagrams with others on the web)

Interoperability

User Accessibility

Office 2007; Office 2007 / 2010(accessibility investments, section 508 and WCAG 2.0); Office 365 E1 / E2 / E3 / E4; Office SharePoint Server 2007; SharePoint Server 2010; SharePoint Server 2010 (WCAG compliant browser forms)

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide51

Phase 3: APO

B

S

R

D

BI and Analytics Platform

Business Intelligence

Data Mining Add-ins for Microsoft Office; Office 365 E1 / E2 / E3 / E4 / K2; Office Professional 2010 (Excel 2010); Office SharePoint Server 2007; PivotViewer; Power View; PowerPivot; Report Builder; SharePoint 2010 Enterprise (Excel Services, PerformancePoint Services, Visio Services); SharePoint 2010 Enterprise (Activity Feeds, Visio Services); SharePoint 2010 Enterprise (Excel Services); SharePoint 2010 Enterprise (Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Enterprise (Insights, Excel Services, Visio Services, PerformancePoint Services); SharePoint 2010 Standard; SharePoint Foundation 2010; SharePoint Online (Insights, Excel Services, Visio Services); SQL Azure; SQL Azure Reporting; SQL Server 2008 R2 / 2012; SQL Server Analytic Services; SQL Server Reporting Services; Visio 2007 / 2010

Data Warehouse Management

SQL Server 2008 R2 Data Center; SQL Server 2008 R2 Enterprise; SQL Server 2008 R2 Enterprise (Fast Track, SQL Server Analysis Services, SQL Server Reporting Services); SQL Server 2008 R2 Parallel Data Warehouse; SQL Server 2012; SQL Server 2012 (SQL Server Analysis Services, SQL Server Reporting Service); Visual Studio 11 / 2010; Visual Studio 2008 (BI Development Studio)

Big Data

Information Services and Marketplaces

Database and LOB

Platform

Transaction Processing

Data Management

Office Professional 2010; Office SharePoint Server 2007; SharePoint 2010; SQL Server 2005 / 2008 / 2008 R2 / 2012

Application Infrastructure

Custom Development

Internet Applications

Microsoft .NET Framework; Expression Studio 3 / 4; Expression Web 4; Internet Information Services (IIS) 7 / 8; Office SharePoint Server 2007; SharePoint 2010; Silverlight; SQL Azure; SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008; Visual Studio 2010 Premium; Visual Studio 2010 Professional

Component and Service Composition

BizTalk ESB Toolkit; BizTalk Server 2006 R2 / 2009 / 2010; Office SharePoint Server 2007 (Business Data Catalog); SharePoint 2010 (Business Connectivity Services); SQL Server 2008 R2 / 2012; System Center 2007 / 2012; Windows Server AppFabric

Enterprise Integration

Microsoft .NET Framework; BizTalk ESB Toolkit; BizTalk Server 2009 / 2010; SQL Azure; SQL Server 2008 R2 / 2012; System Center 2012; System Center Operations Manager 2007 R2; Visual Studio 11; Visual Studio 2010 Professional; Windows Azure AppFabric; Windows Server AppFabric

Development Platform

SQL Server 2008 R2 / 2012; Visual Studio 11 / 2008 / 2010; Visual Studio Team Foundation Server 2010; Windows SDK

Application Lifecycle Management

Office Professional 2010; Project 2010; Visual Studio 11 / 2010; Visual Studio 11 Team Foundation Server; Visual Studio 2010 Ultimate; Visual Studio Team Foundation Server 2010

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIESSlide52

TECHNOLOGIES

CONCEPTUAL

ARCHITECTURE

LOGICAL

ARCHITECTURE

MAPPING

PHASE

DEFINITION

TECHNOLOGIES

Business

Driver

Category ProductReduce the carbon footprint by minimizing the environmental impact of technology

Dynamics AX 2009/2012:

Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets

Measure and track internal resources and environmental impact goals

Dynamics AX 2009/2012:

Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets

Support creation, management, and monitoring of compliance frameworks

None

Normalize corporate compliance with external environmental regulations

Dynamics AX 2009/2012:

Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets

Microsoft Bing

Maps:

Integrate services for a dynamic online experience via maps and geospatial images to report environmental quality issues and status

Respond to consumer expectations that industries take a holistic approach to sustaining the environment

Dynamics AX 2009/2012:

Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets

Participate in business opportunities that sustain the environment

Dynamics AX 2009/2012:

Connect environmental sustainability dashboards to historical data and use analysis tools to evaluate performance data, plans, and targets

Phase 3

Category ProductsSlide53

CONCEPTUAL

ARCHITECTURE

MAPPING

TECHNOLOGIES

LOGICAL

ARCHITECTURE

PHASE

DEFINITION

CONCEPTUAL

ARCHITECTURE

Phase 3Slide54

LOGICAL

ARCHITECTURE

CONCEPTUAL

ARCHITECTURE

TECHNOLOGIES

MAPPING

PHASE

DEFINITION

LOGICAL

ARCHITECTURE

Phase 3Slide55

Agenda

Recap Discussions to Date

Next Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize

the Capability RequirementsSlide56

Example: Steps to Customize the Solution

Identify your top-priority business drivers

Identify the business capabilities in the Capability Discussion Guide that match your priorities (see below)

Choose the phase (Phase 1, Phase 2, or Phase 3) that corresponds to your priorities

Add, remove, or adjust capabilities

Customize

the pre-defined solutions

(Phase 1, Phase 2, or Phase 3) by doing the following:

Understand your priorities

Choose a starting point

Adjust the mappingSlide57

Example Solution Area: Phase 1

B

S

R

D

Datacenter

Mgt

and Virtualization

Data Center Mgt & Virtualization

Deployment and management of software updates are tool based. The organization actively uses virtualization to consolidate resources for production workloads. Some production server resources are virtualized. A virtualized server pool is offered as a service. Performance monitoring of physical and virtual hardware with defined SLAs; health monitoring of applications; supported across heterogeneous environments with manual remediation. Services are available during server failure (for example, server clustering, hot spares, and virtualization recovery solution).

Server Security

Protection against malware is centrally managed across server operating systems within organizations, including the host firewall. Protection for select mainstream/non-custom applications and services (such as email, collaboration and portal applications, and instant messaging), if available, is centrally managed. Integrated perimeter firewall, IPS, web security, gateway antivirus, and URL filtering are deployed with support for server and domain isolation; network security, alerts, and compliance are integrated with all other tools to provide a comprehensive scorecard view and threat assessment across data center, application, organization, and cloud boundaries. Remote access is secure, standardized, and available to end users across the organization.

Networking

Redundant Domain Name System servers exist to provide fault tolerance. Dynamic Host Configuration Protocol servers are network-aware and include support for automatic configuration. Network quality of service (basic prioritization of applications and services) is standard, with manual allocation of available bandwidth. IPv4 is present for main transport services, using IPv6 for some transport services (for example, to achieve a larger address range).

Storage

If a single disk or system component fails, no data is lost but data availability may be interrupted. Critical data is backed up on a schedule across the enterprise; backup copies are stored offsite, with fully tested recovery or failover based on service-level agreements.

Device Deployment and Management

Device Mgt & Virtualization

?

Mobile device access configuration is automated and is pushed over-the-air. A solution is in place to configure and update devices. Mobile phones are used for over-the-air synchronization with email, calendar, and contacts.

Device Security

Protection against malware is centrally managed for desktop systems and laptops and includes a host firewall; non-PC devices are managed and protected through a separate process.

Identity

& Security

Services

Identity & Access

?

To control access, simple provisioning and de-provisioning exists for user accounts, mailboxes, certificates or other multi-factor authentication methods and machines; access control is role-based. Password policies are set within a directory service to enable single sign-on across boundaries for most applications. Password resets occur through internal tools or manual processes. There is a centralized group/role based access policy for business resources, managed through internal tools or manual processes. Most applications and services share a common directory for authentication across boundaries. Point-to-point synchronization exists across different directories.

Information Protection & Control

Persistent information protection exists within the trusted network to enforce policy across key sensitive data (such as documents and email); policy templates are used to standardize rights and control access to information.

IT Process & Compliance

IT policies are documented for each IT service.

Each IT service has a process to manage bug handling and design changes; IT services are tested according to defined test plans based on specifications. IT service release and deployment processes are formally defined and consistently followed. Each IT service provides service-level and operational-level agreements. Processes to manage incidents are in place for each IT service. Monitoring, reporting, and notifications are centralized for protection against malware, protection of information, and identity and access technologies. Problem management processes are in place for each IT service, with self-service access to knowledge base. Risk and vulnerability are formally analyzed across IT services; IT compliance objectives and activities are defined and audited for each IT service.

Example: Customized Solution RequirementsSlide58

Example: Tips to Customize the Solution

Server Security

helps protect and secure the server infrastructure at the data center from viruses, spam, malware, and other intrusions.

Consider using an alternate maturity level that corresponds to your requirements

Identify, document, and discuss how a capability may be relevant

Keep a capability if you are unsure whether you need itSlide59

Agenda

Recap Discussions to Date

Next

Steps

Solution Guidance

Phase 1

Phase 2

Phase 3

Customize the Capability RequirementsSlide60

Engagement Approach

Audience

Solution road map

Solution areas

Industry

Horizontal

Business strategy

Integrated Capability Analysis > Projects, architecture, products

Present relevant integrated capabilities

Position the Integrated Capability approach

Business executives

Understand business needs and priorities

Discuss range of potential solution capabilities

IT

executives

Architects IT pro/dev executivesSlide61