systems integration (1)

Upload: chaim-taylor

Post on 03-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Systems Integration (1)

    1/76

    VOL 10 NO 22012

    SySTEmSINTEgraTION

    Infosys Labs Briefings

  • 8/12/2019 Systems Integration (1)

    2/76

    The erlier hlf of IT evolution ws priril focused on utoting

    tie consuing nd lbor intensive tsks. Lter, sstes were built to

    utote ll nd sundr orgniztionl processes. as infortion sstes

    de workforce productive, n stte-of-the-rt sstes were built in

    silos trgeting prticulr proble. These sstes were built using vried

    lnguges nd on vried environents. a need ws then felt to integrte

    these disprte sstes to build sste tht hs best of ll worlds

    functionlit. Sstes Integrtion (SI) therefore eerged s field tht

    brought together disprte sstes to operte s one single sste.

    Tod the role of sstes integrtors is becoing incresingl iportnt

    s ore nd ore sstes re being developed nd such newl built

    sstes re to be in snc with the existing sstes. The job of the sstes

    integrtors is therefore tht of developing interfces to new nd existing

    sstes such tht the glue together s one sste.

    moderniztion of existing pltfors hs in w becoe the need of the

    hour nd no sne enterprise cn go bout engging in oderniztion

    inititive inus clerl defined ethodolog. One cnnot do w with

    existing legc sstes, not onl becuse of the huge replceent costs thtenterprises will hve to incur, but lso becuse of the inherent dvntges

    tht the hve in ters of being storehouses of enterprise processes nd

    dt. Therefore, better nd cleverer w of ebrcing odernit is b

    integrting legc sstes with tods enterprise pplictions. Enterprises

    now re therefore not to shed their legc sstes but odernize the

    leverging SI expertise.

    SI hs trditionll been looked upon s deploent nd intennce

    function. However, tods SI hs the cpbilit to prtner enterprises in

    their business trnsfortion journe. In this collection we hve ppers tht

    shed light on how sstes integrtors cn pl ke role in odernizing

    legc nd helping trnsfor orgniztions into srter orgniztions.

    your feedbck is iportnt to us. as usul, do write to us with our

    suggestions on how we cn further iprove our reding experience.

    yogesh DndwteDeput Editor

    [email protected]

    Infosys Labs BriefingsAdvisory Board

    Anindya Sircar PhDAssociate Vice President &

    Head - IP Cell

    Gaurav Rastogi

    Vice President,Head - Learning Services

    Kochikar V P PhDAssociate Vice President,

    Education & Research Unit

    Raj JoshiManaging Director,

    Infosys Consulting Inc.

    Ranganath MVice President &Chief Risk Officer

    Simon Towers PhDAssociate Vice President and

    Head - Center for Innovation forTommorows Enterprise,

    Infosys Labs

    Subu GoparajuSenior Vice President &

    Head - Infosys Labs

    modernize Legc with

    Sstes Integrtors

  • 8/12/2019 Systems Integration (1)

    3/76

    Infosys Labs Briefings

    3

    7

    15

    21

    29

    35

    45

    53

    59

    VOL 10 NO 2

    2012

    Discussion:Why Enterprise Customers Require Integration with Legacy System?By Anil Prasad Kurnool and Senthilkumar P.R

    Seamless integration of enterprise applications is a must in todays competitive world.With more and more devices and platforms coming into existence the need forintegration of enterprise applications has become stronger and all pervasive.

    Trend:Complex Events Processing A New TrendBy Karthicraja Gopalakrishnan and Ladislav GataComplex Event Processing (CEP) is emerging in an era when service orientedarchitecture (SOA) and business process management (BPM) are reaching theirmaturity. In this paper the authors analyze how CEP can provide significantbenefits to organizations.

    Viewpoint:How Systems Integrators Can Help Build Smarter Organization?By Saurabh Johri and Ganesh JayaramanEnterprises are looking upon System Integrators skills to aid them in

    their strategic journey and become smarter organizations.

    Analysis:Effectiveness of EA Frameworks in Achieving BITA:An Analysis Based on SAMMBy Ramkumar DarghaBusiness IT Alignment (BITA) is one of the main goals of all enterprise architecture(EA) initiatives. The author draws from his practical experience in discussingthe applicability of SAMM model to the popular EA frameworks like TOGAF,ZACHMAN and analyzing the effectiveness of the support provided by theseframeworks in achieving BITA.

    Approach:Proactive Performance Engineering for E-commerce ModernizationBy Saurabh kumar Mishra, Balaji Subbaraman and Rohit ChristopherModernization of existing platforms is the need of the hour and enterprises are

    engaging in a modernization initiative without a clearly defined methodology.The authors propose a simple approach that would ensure the success of themodernization program.

    Model: How Systems Integration Helps Achieve Progressive Business Transformations?By Anirban Ghosal and Narayanan ChathanurBusiness transformation is aimed at producing enterprise level performanceimprovement through radical changes in the business and IT systems. In this paper,the authors present a view on how this complex process of progressive transformationcan be achieved through simple steps of aligning the business vision with IT vision.

    Framework: Applications Integration with ESBBy Prakash Rajbhoj and Narayanan ChathanurAll types of enterprises whether small or large always have the need for EAI.Traditional EAI is expensive and has its own incumbent problems. In this paper theauthors show how enterprises can create an integration platform for their IT systemsby using the pillars of EAI and SOA and solve their business problems.

    Insight: Solution Architecture in Large Transformation ProgramsBy Suchit BhatwadekarSolution architecture is a framework to develop end-to-end view of change that fullycaters to the business needs, ensures technical compliance within budget and has amaintainable schedule. In a transformation program, success of any solution is heavilydependent on the acceptance of the solution by the relevant stakeholders opines theauthor.

    Practioners Perspective: Role of Systems Integrators in the Co-creation ProcessBy N.VijaykumarCo-creation is a budding discipline of the current wave of innovation. Collaborative

    creativity focusing on people and aiming to enhance the value provided to consumersis the focus of co-creation. In this paper the author explains how systems integratorscan help organizations realize the co-creation dream.

    Index

  • 8/12/2019 Systems Integration (1)

    4/76

    In a transformation program, success of anysolution is heavily dependent on the acceptance

    of the solution by the concerned stakeholders.

    Suchit Bhatwadekar

    Principal Technology Architect

    Finacle Consulting andSystem Integration Practice,

    Infosys Limitied.

    Successful systems integration has enabled organizations

    improve operational efficiency with better reaction time,

    information accuracy and integrity.

    Karthicraja Gopalakrishnan

    Senior Technology Architect

    Financial Service and Insurance

    Consulting & System Integration Practice,

    Infosys Limited.

  • 8/12/2019 Systems Integration (1)

    5/76

    3

    VOL 10 NO 22012

    Why Enterprise Customers RequireIntegration with Legacy System?

    Enterprises can ill afford to shedlegacy systems completely

    By Anil Prasad Kurnool and Senthilkumar P.R.

    Se a m l e s s i n t e g r a t i o n o f e n t e r p r i s eapplications is a must in todays competitiveworld. With more and more devices and

    platforms carrying data processing muscle

    - the most common example being mobile

    phones, the need for integration of enterprise

    applications has become stronger and all

    pervasive.

    For the enterprises to achieve the

    elusive agile IT infrastructure all the systems

    need to be integrated and data flow must

    happen without hindrance. Legacy never

    dies! goes an old adage. In an industry offaster hardware (Moores Law), fast moving

    data (IPv6 networks) and better applications

    development methodologies (OOPS, 4GL)

    legacy system still strives and holds its own

    fort, making it in most of the cases the back

    bone of enterprise IT.

    CIOs today are caught in the perpetual

    dichotomy of ensuring that their IT supports

    the fast changing business dynamics even

    while retaining legacy systems as part of the

    endeavor.

    IMPORTANCE OF AND NEED FOR LEGACY

    From the perspective of stability, CIOs hark on

    the benets that legacy systems have to offer in

    comparison to the current systems and hence

    legacy systems are the most preferred choices to

    host core applications of enterprises. Robustness

    is another key feature that makes legacy systems

    extremely reliable and promising [1].

    In addition, one cannot discount the fact

    that an enterprises historic information that

    is stored deep within legacy systems plays an

    important role while collaborating with external

    partners and stakeholders.From a pecuniary perspective too,

    legacy systems score heavily in comparison

    to niche technologies primarily because of

    three reasons easy availability of talent

    pool to maintain the legacy system; cost

    effectiveness in operations and the need for

    fresh investments in replacement technologies.

    Legacy system can also be considered

    as a source of competitive advantage to the

    enterprise as the logic residing in it makes it

    difcult for the competitor to emulate.

    Infosys Labs Briefings

  • 8/12/2019 Systems Integration (1)

    6/76

    4

    Some popular reasons that make the legacysystems the most preferred choice are mentioned

    below.

    Cost of redesigning/replacing a

    legacy system is substantial due to the

    complexity of the functionality. The

    decision of the replacement or redesign

    depends on the cost-benet analysis.

    Dismantling of the system might

    affect a business function, if no proper

    equivalent alternate arrangements are

    considered. This reinforces the above

    mentioned reason that complexity in

    building a new application on lines of

    the functionality present in legacy is far

    from welcoming.

    Lack of sufcient technical knowledge

    of the current generation development

    community to understand the legacy

    system and absence of documentation

    of the algorithms used to develop the

    applications forms a formidable challenge

    when one wants to replace legacy [2].

    CFOs lack of interest in exploring new

    IT ventures, especially when the legacy

    systems serve the current purpose.Also failure witnessed in migration and

    modernization initiatives is a stumbling

    block that fuels the fear of a CFO from

    making any new investments in newer

    technologies [3].

    Despite the hue and cry to migrate

    to more sharper and efficient technologies,

    legacy systems are going to stay for the reasons

    mentioned above. So it would make sense for

    enterprises to integrate the advantages that

    legacy systems have to offer to realize the muchneeded business agility.

    NEED FOR INTEGRATION WITH LEGACY

    To stay ahead of the competition companies

    must adopt cost effective IT solutions and be

    more agile in their business. The pace at which

    technology evolves and the resulting changes

    have become a constant challenge to the

    enterprise IT systems. It is not cost effective to

    replace or redesign the applications whenever

    there is a change in technology.

    Many enterprises would have a set of

    applications created for each of their business

    lines. Over a period of time, enhancements

    and enrichments made to these systems might

    have pushed them towards becoming islands of

    information or silos. Such silos can be reckoned as

    legacy systems. And today, most new initiatives

    that enterprises engage in may need data from

    different silos. It is here that the business value of

    data hidden in the legacy systems can be leveraged

    in new business processes and operations by

    providing efcient ways to integrate.

    Legacy systems do not have their business

    logic/functionalities in a readily usable form.

    Till their core functionality is made available

    in a reusable form, their features might not be

    providing the needed value to the business. This

    reusability aspect makes the integration of thelegacy systems with other applications a highly

    prudent investment for the business.

    New business regulations might require

    signicant changes and customization to the IT

    infrastructure for audits. Data residing in legacy

    system can be harnessed by integrating the

    legacy system with other applications thereby

    bringing in the much needed transparency in

    audit exercises.

    This integration approach reduces the go-

    to-market time for any new business initiative.

  • 8/12/2019 Systems Integration (1)

    7/76

    5

    Other needs that can prompt integrationwith legacy would be a new business process

    optimization initiative, or even a lack of a

    complete new commercial off-the-shelf (COTS)

    application that can support entire business

    needs of an enterprise.

    It might be faster to integrate and

    assimilate a legacy system than to replace it. As

    an additional benet, even while considering

    the replacement of legacy due to shelf life issues,

    it is benecial to go in with an integrated legacy

    system approach.

    Once integrated with the perspective

    of retirement, any legacy application can be

    moved from the core of the IT to be a deemed

    as component of IT. This shift would enable

    the CIO to segregate the coarse grained

    functionalities hosted in legacy system along

    with their auxiliary ne grained functionalities

    into buckets and then start looking out for

    alternatives to these buckets.

    Once an alternative is found, then the

    bucket from legacy can be retired and the

    alternate can be used. This co-existence of

    legacy and its alternate may seem to be a long-

    drawn retirement plan, but the integration

    mitigates most of the risks involved in big-bang

    approach, as the hot-swap is ready, in case of

    any eventuality and the change needs to be

    rolled back as the legacy is still integrated withthe current IT landscape.

    PATTERNS OF INTEGRATION FOR

    LEGACY SYSTEMS

    Todays integration technologies have different

    and innumerable techniques for integrating

    with the legacy applications. These can be

    broadly classied as --

    Screen Scraping Technique: This technique is

    typically used for terminal based legacy system

    where the data on a screen is read through anauxiliary port. The data is fed to a form on the

    screen too by writing data to the terminals

    memory. This technique mimics a human

    interaction with a terminal (also called dumb

    -terminal). Even in cases where the existing

    application might not be having any known

    application programming interface (API) this

    technique can be used. This technique can be

    used even when the source code of the system is

    too complicated to understand, just by writing

    directly into the memory of the application.

    In a nutshell this is a non-intrusive technique.

    Message-based Interactions: IBMs MQ

    Series pioneered this technique of message-

    based interaction. The product suite or the

    middleware, also called Message Oriented

    Middleware, can be hosted on a very wide

    range of hardware and heterogeneous operating

    systems, ranging from Mainframes to AS/400 to

    WinTel. Applications considered for integration

    need to only communicate with the local agent

    on the same box that can provide a message

    to the application in the form of subscription

    or in a request-response fashion. Based on the

    use case, this technique can be either intrusive

    (making changes to application to accept

    message based instructions) or non-intrusive

    (where the application implicitly understandsthe contents and context of message.) This

    technique is currently in vogue in most legacy

    system based enterprises.

    Transaction Wrapping: If the legacy application

    uses any of the transaction systems like CICS,

    these transactions are wrapped by agents hosted

    on the legacy applications box itself. Starting

    with ver 3.0, CICS Transaction Server from IBM

    began providing wrapping services out-of-box,

    in form of web-services [4].

  • 8/12/2019 Systems Integration (1)

    8/76

    6

    BENEFITS OF INTEGRATING LEGACYSYSTEMS

    Of the many options and routes taken by

    enterprises for IT agility business process

    management (BPM) and services are the

    most preferred options. BPM solutions help

    enterprises adapt to the fast changing market

    conditions and business opportunities quickly

    by providing the required tools to the business

    users to change the business processes with

    relative ease.

    The crucial differentiator of a BPM

    solution from other IT solutions is that BPM

    can be used to create new value by compositing

    new business services out of the existing

    business systems without impacting the

    existing landscape. In this context the agility

    derived from BPM-based services includes

    legacy systems services without changes

    to them. Preserving and extending legacy

    systems through BPM-based solution allows

    the enterprises to retain their key systems

    and capitalize on their strengths. This also

    mitigates the potential risk associated with

    replacing mission critical applications hosted

    on legacy systems. By integrating the legacy

    systems business processes can leverage the

    data that is residing deep inside them. Through

    integration, a layer of abstraction is provided

    to the landscape, which can be used and reusedby services and BPM without impacting the

    underlying implementation in the legacy

    system or in any other system.

    CONCLUSION

    Modern enterprises need dynamic and agile

    systems to take care of their business demands.

    However, enterprise IT landscapes are dotted

    with the presence of legacy applications. A

    typical legacy system is too expensive and risky

    to be done away with.

    Robustness, reliability and securityoffered by legacy systems make them the

    most preferred choice to host core business

    functionalities. Usually they earn the patronage

    of the CxO community from their cost effective

    operations, abundant talent pool and historic

    data reasons. However, in any initiative to

    automate or SOA-enable an enterprise to cater

    to the growing business demands, legacy

    systems become the proverbial last mile to

    achieve the needed IT agility.

    Legacy systems are here to stay and

    enterprises need to explore the options of

    inclusive agility by integrating them with

    other applications instead of replacing them.

    Once integrated, the Legacy systems would

    prove to be a cost effective way of providing

    the functionality needed by business in a very

    robust, secure and a reliable way.

    REFERENCES

    1. Soltis, F. (September 2002), Delivering

    Mainframe Advantages to Your Business.

    In The Power of Mainframe Computing.

    Available at http://www-07.ibm.

    com/servers/eserver/au/iseries/

    downloads/i890_nal_whitepaper.pdf.

    2. Lack of documentation (Definition).

    Available at http://www.cc.gatech.edu/

    morale/local/morph_glossary.html.3. Bergey J., Northorp L., Smith D. (October

    1997), Enterprise Framework for the

    Disciplined Evolution of the Legacy

    Systems. Available at http://www.sei.

    cmu.edu/reports/97tr007.pdf

    4. Rayns, C., Burgess, G. ,Cooper, P. et.al

    (January 2010), Application Development

    for CICS Web Services IBM Redbook,

    Chapter 2, ISBN 0738433853. Available

    at http://www.redbooks.ibm.com/

    abstracts/sg247126.html.

  • 8/12/2019 Systems Integration (1)

    9/76

    7

    VOL 10 NO 22012

    CEP is fast emerging as a major breakthroughfor mainstream adoption in enterprises than

    merely being an extension to conceptslike SOA and BPM

    Complex Events Processing A New Trend

    By Karthicraja Gopalakrishnan and Ladislav Gata

    Infosys Labs Briefings

    For many years, once of the key successfactor for business process automationhas been enterprise application integration

    (EAI), which enabled enterprises to make their

    applications talk to one another though they

    were not originally built for such dialogues.

    Successful systems integration has enabled

    organizations improve operational efciency

    with better reaction time, information accuracyand integrity. Complex Event Processing

    (CEP) elevates these benets to the next level

    by enabling organizations link interrelated

    business events arising out of the enterprise

    systems and develop powerful real-time

    business intelligence and cognitive business

    processes.

    CEP creates such benets by enabling a

    very powerful event denition and detection

    capability in the enterprise system integration

    landscape. CEP as a market solution on the

    one hand provides mechanism for the user to

    dene event patterns and deploy, and on the

    other hand provides a powerful engine that

    can recognize event patterns from the cloud

    of enterprise system events and trigger an

    automated response. Due to its event processing

    power, CEP systems can be made to learn and

    apply knowledge automatically and made

    cognitive and capable of changing preferenceswithout enforcing a programmed path. In this

    paper, we analyze how CEP can contribute

    signicantly to the competitive advantage of

    organizations.

    CEP is emerging in an era when service

    oriented architecture (SOA) and business

    process management (BPM) are reaching

    their maturity. As SOA and BPM have been

    signicantly affecting the system landscape in

    recent years, the impact of CEP on enterprise

    architecture very much depends on how it will

  • 8/12/2019 Systems Integration (1)

    10/76

    8

    marry with these major trends. CEP is joiningSOA and BPM on mission to make enterprise

    systems more open to frequent changes

    implied by increasing dynamics of the market.

    CEP brings an architecturally strong concept

    that enables people define more complex

    and more dynamic business processes, but

    more importantly it can make systems learn

    how to optimize business processes without

    human intervention. Although CEP has set

    off on journey towards mainstream enterprise

    technologies mainly by lling the gaps in BPM

    and SOA, in the long term it can overrun these

    concepts completely and might lay down the

    foundation for a new generation of enterprise

    systems powered by central information

    backbone and central intelligence.

    WHAT IS COMPLEX EVENTS PROCESSING?

    Enterprises have tried to surface business

    significant events from their mainstream

    systems for many years now. They were in

    the form of specialized handling of conditions

    like raising an alert when the inventory drops

    to a certain level, or executing an alternative

    operation when business exceptions occur or

    automatically escalate priority if a particular

    business process has not met its service

    level agreement, etc. However, these events

    were implemented with in an application ora program module and traditionally had a

    very limited scope. Secondly, the concept of

    analyzing important enterprise events did

    exist in the past in the form of management

    information reports; however, they did not

    cater to producing real time automatic response

    or understanding interrelated complex events.

    CEP bridges this gap and takes event processing

    to the next level in the enterprise. We dene CEP

    as an enterprise system capability to analyze

    and interpret the complex series of interrelated

    events arising out of the enterprise systems withan aim to recognize business signicant events

    in real-time. The recognition of an event can be

    used for different types of actions. It can alert

    humans if the event needs a user attention; it

    can trigger automated action in various systems;

    or it can distribute information provided by the

    event across enterprise.

    Some organizations have successfully

    implemented CEP for many years in the elds

    of algorithmic trading, traffic management

    fraud detection, anti-terrorism and in expert

    military systems. They have significantly

    improved human efciency in understanding

    and processing business significant events

    from the endless array of information pipeline.

    However, the benefits of the CEP have not

    reached the enterprise systems.

    WHY IS CEP A POWERFUL CONCEPT?

    CEP can help enterprise IT and business in

    many ways. A CEP application can proactively

    recognize a business significant event and

    automatically trigger a corrective action or

    can surface the complex and behind the scene

    details of a seemingly known event to enable

    corrective work on the real problems or develop

    a central intelligence hub in a non-invasive

    manner to control an existing business process

    or build a dynamic business process that isdened by states than steps. To understand

    how CEP delivers such power and benets it

    is essential to understand the anatomy of a

    CEP system.

    CEP is an event processing system.

    In the center of this powerful system lies a

    data processing engine capable of handling

    huge data correlation in memory. The data

    correlation engine builds an event pattern

    recognition component to form the core of

    CEP. CEP solution development is about

  • 8/12/2019 Systems Integration (1)

    11/76

    9

    designing event patterns and is developedby business analysts using the event pattern

    modeler. Figure 1 depicts the key components

    involved in a CEP system.

    This architecture of CEP provides the

    power and effectiveness in a number of ways;

    CEP architecture is event based hence does not

    manifest its presence in other applications in the

    enterprise landscape and can easily plug into an

    existing infrastructure to consume the already

    exposed messages. Its capability to process

    huge data in-memory under million operations

    per second enables real-time analysis of current

    and historical data. The adapters and agents

    allow consuming data from disparate sources

    and nally the action manager allows triggering

    compensating operations orchestrated from

    outside the existing enterprise applications.

    CEP is extremely powerful because of its huge

    power to analyze, predict, execute and learn

    from a huge pile of information from disparate

    sources in real-time and more importantly, in a

    non-invasive manner.

    HARNESSING THE POWER OF CEP

    Though originally conceptualized as an advanced

    monitoring solution, CEP today is expanding

    in different areas of enterprise systems by

    providing real-time intelligence it brings in

    the next level of business process visibility inVorder to enable on-time and accurate business

    decisions; by enabling unstructured business

    process denition; by making processes more

    complex, dynamic and exible and by bringing

    in aspects of expert systems to enterprise

    environment and laying the foundation of future

    cognitive enterprise systems.

    Real-time Intelligence

    Business intelligence has been a batch processing

    functionality for enterprises in the past. They

    produced daily, weekly and monthly reports

    to present a historical view of the business

    efciency. CEP takes this to the next level by

    providing real-time business intelligence which

    means corrective actions and optimizations can

    be made instantaneously.

    Another important benet of CEP is that

    it can subscribe to events from disparate sources

    it can be a network event, or storage device

    event or events from business systems. CEP

    can consume no matter where the event was

    generated. Detection of semantically equivalent

    fragments from such varied sources has never

    been possible before and CEP has enabled it.That means business intelligence can be robust

    and extensive.

    Unstructured Business Processes

    For many years BPM solution strategy assumed

    that the business processes are sequential and

    predened in certain structure which we call

    procedural BPM. Over years of implementation

    a better understanding has emerged from

    experience that the business process are

    unstructured to the tune of about 60-70% and

    Figure 1: Key Components in a CEP SystemSource: Infosys Research

    Event Pattern Modeller

    (Design-time)

    Event Pattern Recognition Engine

    Message Bus

    Database

    Rule EngineAction

    Manager

    Agents/

    Adapters

  • 8/12/2019 Systems Integration (1)

    12/76

    10

    not supported sufciently by the current BPMproducts in the market [2].

    As an example, it is not hard to relate

    in your enterprise that on many occasions the

    user of the business processes wants to change

    the way the process is executed. She may want

    to skip one of the steps due to a newly arisen

    situation or perform the 4th step before the 3rd

    step or perform 3rd and 4th step in parallel or

    breakdown the 3rd step into two and perform

    in the order of 3a, 4, 3b. The point is the

    sequence of the business process can change

    very frequently.

    The current BPM products in the market

    do not cater to this fundamental change in

    the way workows are dened and are hence

    fairly inefcient in delivering to the business

    requirements. In situations like these CEP

    brings in a major advantage. It can be used for

    developing unstructured business processes

    by putting the user focus on to advancing

    the business process states than advancing

    through the steps. This is a major shift in the

    way workflows are defined, modeled and

    implemented today. One of the real world

    examples of such process is mortgages and

    loans that have a very long and complex

    lifecycle with many variations of loans and

    mortgage products. It is too difcult to model

    in a procedural way.

    Cognitive Systems

    Articial intelligence has not been used much

    in enterprise business processes partly due to

    the complexity involved in developing them

    and partly because of the capacity required in

    its execution. The characteristics of CEP such as

    loosely coupled event based architecture, huge

    in-memory processing power and the capability

    to recognize event patterns can form a foundation

    for implementing expert systems in enterprises.

    A CEP system can be designed suchthat it can analyze the user behavior, preserve

    knowledge and enable automated reasoning

    when there is a high probability of user

    repeating the same action. Self optimizing

    business process can be made a reality with the

    introduction of articial intelligence into the

    enterprise applications.

    There is no doubt that CEPs potential of

    providing added business value is more than

    significant and CEP will become a mainstream

    adoption for enterprises. However the CEP

    jou rney into the ma instream wi ll not be

    easy, as the concept is not just filling a gap,

    but at certain level also interferes with other

    ambitious and more established concepts like

    SOA and BPM.

    CEP AND FUTURE SYSTEM INTEGRATION

    Why should CEP be discussed in context of

    system integration? To give an answer we have

    to understand the role of integration in modern

    enterprise architecture and the direction where

    it is heading to. Integration platforms evolution

    undoubtedly converges to enterprise service bus

    (ESB) concept. ESB driven by SOA concept has

    changed the traditional enterprise application

    integration (EAI) middleware from a plumbing

    infrastructure to a standardized enterprise

    backbone exposing business functions. Theevolution of enterprise IT is coming close to

    the end of one era where business process

    is exclusively owned by applications. ESBs

    today have capability to host process engines

    and containers for mainstream programming

    languages. The standardized environment and

    strong component model of ESB will attract

    more and more business logic to be hosted in

    this ecosystem. In the more distant future this

    trend may lead to architecture of centralized

    backbone with central intelligence.

  • 8/12/2019 Systems Integration (1)

    13/76

    11

    We can nd a direct analogy in natureand compare ESB to nervous system of living

    creatures. The central nervous system (CNS)

    comprising brain and spinal cord is controlling

    all body parts through peripheral nervous

    system (PNS). The enterprise spinal cord is

    the standardized message broker contained by

    ESB, the brain is the integrated process engine

    and the body parts are various enterprise

    applications [Fig. 2]. The PNS is the integration

    capability provided by different adapters and

    bindings which connect applications to the

    central message broker.

    CEP will be a critical aspect of making

    the vision of central intelligent hub a reality as

    this concept will need a more sophisticated brain

    than a process engine with procedural logic. To

    enable continue business process optimization

    the enterprise central intelligence will need to

    employ rule-based reasoning engine or other

    articial intelligence mechanisms in order to

    correlate and react to millions of signals coming

    from various applications. This sort of capability,

    typical for expert systems, is what CEP lays the

    foundation of in enterprise environment. Even

    though CEP is used for specic tasks in various

    industries for decades, it is system integration

    evolution which brings CEP to the mainstream.

    This mainstream can be seen as enterprise

    architecture with central information backboneand central intelligence evolved from CEP

    enabled ESB, an enterprise with CNS.

    CEPS IMPACT ON SOA AND BPM

    SOA has affected enterprise architecture

    dramatically with the evolution of ESB

    technology. It has pushed boundaries of system

    integration and has changed the way how

    applications are built. BPM platforms originally

    developed as standalone tools are becoming

    part of the SOA reference architecture offering

    service orchestration. SOA and BPM hand in hand

    are making an attempt to build new enterprise

    architecture paradigm viz., publish your business

    functions on the bus and model your business

    process in BPM tool. The main driver is exibility,

    easy creation and change in business process

    reusing services. In order to achieve that, ESB

    products are becoming tightly integrated with

    BPM platforms or directly host BPM engines.

    CEP is a new arrival to this family with clear

    ambition to make the business process even more

    exible and dynamic. So, the biggest question

    that remains to be answered is how the marriage

    between CEP, SOA and BPM is going to end.

    SOA is stil l perceived mainly as

    architecture style where one application can

    provide business functions consumed by other

    applications. In order to manage the intraapplication dependencies SOA employs ESB

    as broker between consumer and provider

    applications. This SOA based view of ESB

    mediating and exposing business functions

    for remote invocation has kept out of focus the

    fact that ESB is messaging based with ability to

    send and receive events. For that reason CEP as

    event based infrastructure is fully compatible

    with ESB concept and in the next few years CEP

    is not going to bring any fundamental change

    in ESB evolution.

    Enterprise Central Intelligence

    InternetEnterprise

    Monitoring & Management

    Enterprise Information Backbone

    Mainframes & Legacy Applications Data Centres

    Figure 2: Central Intelligence of EnterpriseSource: Infosys Research

  • 8/12/2019 Systems Integration (1)

    14/76

    12

    ESB provides abstrtaction of differentapplicat ions funct ions and events in

    standardized environment. CEP and BPM

    technologies can be hosted in this environment

    in order to orchestrate those events and

    functions into business logic. BPM enables to

    build procedural based logic, CEP is typically

    rule based. CEP as paradigm has advantage as

    it can model any real world scenario whereas

    procedural modeling cannot. Apparently, this

    may cause an architectural conict since in many

    situations both the concepts are applicable. In

    the long run the stronger CEP concept will very

    likely overtake the mainstream and accompanied

    with other expert system disciplines will become

    a key to the next generation of intelligent

    enterprise systems. Until this happens CEP and

    procedural modeling will coexist in ESB ecosystem

    [Fig. 3].

    In the next few years, CEP will be

    augment more matured BPM platforms making

    business processes more dynamic. From pure

    system integration perspective, CEP engine as

    integral part of ESB will be used for scenarios

    where rule based routing and correlation

    of events is needed. CEP will also help to

    understand and use better the eventing aspect

    of ESB which has been often overlooked.

    Business activity monitoring as the most visible

    CEP discipline today will very likely also enterthe ESB ecosystem in order to get closer to the

    source of business events.

    MATURITY OF CONTEMPORARY

    CEP TECHNOLOGIES

    CEP products are dynamically developing

    and they are catching up with the evolution of

    SOA technologies. Most middleware vendors

    are enriching their SOA product stack with

    a CEP platform which is often referred to as

    event-driven architecture (EDA). The term

    EDA is not used consistently by all vendors as

    in some cases it can indicate ESB capability to

    provide event based interaction without CEP

    features offering.

    The important characteristic of CEP

    technologies is diversity. The diversity is

    caused by two key factors: (a) variability of CEP

    applications in enterprise environment; and (b)

    lack of developed and adopted CEP standards.

    The vast majority of CEP products are platforms

    that can be used standalone or in conjunction

    with other systems including middleware.

    There are also emerging ESB products and BPM

    suites that may offer integrated CEP features.

    In general the standalone CEP platforms

    are more mature because of longer history.

    Another common symptom is that non-

    functional capabilities like development,monitoring and management tools or design

    time governance are not in the spotlight yet

    and we can expect dynamic growth of these

    aspects with the growth of CEP deployments

    and increased overall CEP acceptance by

    mainstream enterprise technology market.

    APPROACHING A CEP IMPLEMENTATION

    CEP implementation is for many companies a

    new area which is a major risk that needs to be

    acknowledged in the rst place and all necessary

    Internet BPM

    Engine

    CEP

    Engine

    Message Broker

    Mainframes & Legacy Applications Data Centres

    ESB

    Figure 3: Coexistence of CEP and BPM in ESB EcosystemSource: Infosys Research

  • 8/12/2019 Systems Integration (1)

    15/76

    13

    project management mechanisms should beemployed to mitigate that risk. Apart from that

    the main challenges of CEP adoption are:

    Identifying the business need for CEP

    Understanding the technical nature of

    the business need

    Selecting and understanding the product

    Dening CEP development methodology

    Implementing CEP in the intended

    fashion.

    How does a company then recognize the

    need for a CEP? In an earlier section we have

    elaborated different areas of CEP applications.

    Business requirements addressing some of

    those areas should be the rst indication of a

    possible CEP need. Subsequently, the particular

    business scenario has to be scrutinized in order

    to correctly understand its technical nature.

    Just precisely derived technical requirements

    can justify whether CEP platform would bring

    an added value.

    In the CEP product selection process

    the technical requirements play a key role as the

    CEP platform is a sort of software infrastructure

    without out-of-the-box business functionality,

    therefore the evaluation is focused purely on the

    technical aspects. The selection process is more

    challenging, as for instance, unlike applicationservers or ESB products, CEP platforms are

    not standardized. By evaluating an application

    server in the current market the license cost and

    level of support might be more important than

    actual capabilities. Standardization has brought

    many vendors so close in terms of features that

    product selection does not mean a signicant

    risk. This is not the case for CEP today. Detailed

    technical requirement specication and proper

    understanding of the product can make a huge

    difference in project execution.

    To get the right condence it is criticalto work closely with vendors in the product

    selection process. There are no standard

    methodologies for CEP development, hence

    getting close to the product before it gets

    selected will help one to identify any additional

    challenges and risks of delivery and maintenance

    process.

    CEP implementation shows symptoms of

    high risk projects, hence solution prototyping

    and incremental delivery process is preferable

    and can help nalize the project in intended

    fashion.

    CONCLUSION

    The CEP as a mainstream is at the beginning, but

    should not be ignored. To leverage the full power

    of CEP may require radical transformation of

    the entire system integration landscape. CEP

    function is to capture events and trigger actions

    in real-time. In this aspect SOA maturity can

    be a critical factor since in an environment

    where business events and business functions

    are available in standardized ESB ecosystem,

    future CEP implementation can be achieved

    with lower risk and higher added value. Thus

    even if a CEP project is not on your short-term

    roadmap, including the CEP readiness in the IT

    strategy is the right step to do today.

    Although CEP implementation maybe seen as high on investment risk in terms

    of project realization, the possible benefits

    it can yield may be significant. The added

    business value may bring an important

    competitive advantage and major breakthrough

    in companys business. Bringing exibility of

    business process to a new level and ensuring

    that decision-making information is available

    in real-time can open new opportunities of

    business innovations and major improvements

    in operational excellence.

  • 8/12/2019 Systems Integration (1)

    16/76

    14

    4. Vollmer, K. (2009), Forrester WaveComprehensive Integration Solutions

    Q4 2010 for Application Development

    & Delivery Professionals. Available at

    http://www.oracle.com/us/corporate/

    analystreports/infrastructure/forrester-

    cis-wave-2010-189779.pdf.

    5. Gualtieri, M., Rymer, J. (2009), The

    Forrester Wave- Complex Event Processing

    (CEP). Available at http://www.forrester.

    com/rb/Research/wave%26trade%3B_

    c o m p l e x _ e v e n t _ p r o c e s s i n g _ c e p _

    platforms%2C_q3/q/id/48084/t/2.

    6. Event-Driven SOA: A Better Way to SOA

    (2011). Available at http://www.tibco.

    com/multimedia/wp-event-driven-

    soa_tcm8-803.pdf.

    REFERENCES1. Luckham, D. (2001), The Power of Events:

    An Introduction to Complex Event

    Processing in Distributed Enterprise

    Systems. Addison-Wesley Longman

    Publishing Co., Inc., Boston, MA, USA.

    2. Luckham, D. (2001), A Short History of

    Complex Event Processing. Available

    at http://complexevents.com/wp-

    content/uploads/2008/02/1-a-short-

    history-of-cep-part-1.pdf.

    3. Mishra, R. (2010), Unstructured business

    processes - creating differential BPM

    strategy is the wise thing to do by Rakesh

    Mishra. Available at http://www.

    infosysblogs.com/bpm-eai/2010/01/

    unstructured_business_processe.html.

  • 8/12/2019 Systems Integration (1)

    17/76

    15

    VOL 10 NO 22012

    Harness the potential of your systemsintegrator to build a smarter organization

    How Systems IntegratorsCan Help Build Smarter Organization?

    By Saurabh Johri and Ganesh Jayaraman

    As organizations are increasingly becomingglobal their operations are expandingacross geographies and new products and

    services are being introduced at a rapid pace.

    Consequently, enterprise complexity in terms

    of business processes and underlying IT

    systems has also exploded. The ever increasing

    complexity over time reduces efciency, speed

    and accuracy of operations.

    Organizational complexity has cascading

    impact in multiple areas of business functions.

    For example, an inefficient customer service

    management system can adversely impact

    customer experience and future revenues. Theorganizations inability to accurately view supply

    chain costs will cause reduced prot margins.

    While organizations scale up, IT

    landscapes typically evolve over time as

    disparate subsystems in silos. Such systems

    with limited interoperability offer limited

    view of organizations state and the entire

    business picture. Furthermore the total cost of

    ownership increases due to high maintenance

    costs. According to a Gartner study, typically

    67% of IT spends is directed towards keeping

    the lights on operations which leave little for

    new transformational projects [1]. With new

    technology disruptions like cloud computing

    and mobility gaining traction, an inefcient IT

    organization will impact rm competitiveness.

    System integrators (SIs) have vast

    expertise in bringing disparate systems together.

    System integration skills can aid organizations

    in the strategic journey to become smarter

    organizations.

    FACTORS LEADING TO COMPLEXITY

    A close look at a typical IT landscape of a

    large organization will reveal mishmash oflegacy systems, commercial off-the-shelf

    (COTS) ERP and CRM applications and a

    host of custom applications. Decentralization

    of the IT function and its alignment to a

    geography or line of business (LoB) leads to

    multiple instances of the same application

    and duplication of business functionality.

    Enforcing a consistent IT governance policy

    and application landscape is a key challenge

    in the face of rapid changes in the business and

    technology environment.

    Infosys Labs Briefings

  • 8/12/2019 Systems Integration (1)

    18/76

    16

    Business Drivers: As markets are gettingliberalized, companies are increasing their

    global presence extensively.

    Mergers and acquisitions are happening

    on a continual basis and integrating the IT systems

    of two different rms is a complex task involving

    the reconciling of duplicate data and rationalizing

    the different storage systems and applications.

    Organizations exploring the organic

    route to growth introduce new products and

    services that are increasingly away from the

    core business and that require rapid changes

    in business processes and IT systems.

    Technology Disruptions:Technology advances

    in computing and networking require

    organizations to update their legacy systems.

    With the explosion of ecommerce and mobility,

    IT is the key enabler for new business models.

    In a Forrester study, over a thousand

    key decision makers from North America

    and Europe were asked about their priorities

    for from IT. Not surprisingly in the current

    economic scenario, cost reduction (89%) and

    improved business process execution (84%)

    emerged as top business goals [2].

    However, CXOs also recognize the fact

    that to remain relevant and competitive in the

    future, rms need to be more nimble to change

    business processes (71%), improve collaborationand information exchange using technology (69%).

    Organizations are realizing enterprise

    c o m p l e x i t y a f f e c t s a n o r g a n i z a t i o n s

    productivity thereby affecting profitability

    and impairing competitive ability.

    SMARTER ORGANIZATIONS OVERVIEW

    The three characterist ics of a smarter

    organization is the ability to simplify IT

    systems, learn and collaborate better and to be

    able to adapt quickly [Fig. 1].

    Simplify:By simplication of business processes

    and IT systems, accurate and faster information

    ow within the organization can be achieved.

    Identifying key application portfolios,

    creating shared services model by retiring

    duplicate systems within the organization

    translates to immediate business results in

    efciency terms.

    Data is a strategic resource which all

    organizations possess but few are able to

    leverage effectively. Analytics play a key rolein understanding vast reservoirs of data to

    predict client behavior trends and optimize

    supply costs.

    Learn and Collaborate: Global organizations

    today have a diverse workforce in terms of

    culture, demographics and geographies.

    In order to ensure efforts are not

    duplicated and information exchange is speedy,

    the traditional learning methods are no longer

    effective for a mobile workforce.

    Simplify

    Underlying IT

    systems to ensure

    accurate & faster

    information flow

    AdaptBe able to track and

    optimize business

    objectives on a real

    time basis.

    Take fact based decisions

    faster in an uncertain

    business environment

    Learn &Collaborate

    Better knowledgeexchange

    in a distributedmulti-cultural

    workforce

    Figure 1: Characteristics of Smarter OrganizationSource: Infosys Research

  • 8/12/2019 Systems Integration (1)

    19/76

    17

    Knowledge management processes andtools gain greater credence to achieve better

    information exchange and collaboration to

    foster a culture of innovation.

    Adapt: A smarter organization will be able

    to define and track business objectives on

    a real time basis. By providing customized

    view of critical information to each business

    user, proactive interventions and fact based

    decision making can be enabled thus making

    the organization nimble and smarter.

    IMPACT OF CLOUD COMPUTING

    In the past two years, there has been a

    great spurt in interest in cloud computing.

    Looking beyond the hype, CIOs need to ensure

    investments in cloud based offerings deliver

    IT simplification and significant reduction in

    total cost of ownership. The key concerns that

    remain to be completely resolved include data

    security, scalability and potential lock-in with

    a single vendor.

    Current offerings can be classified under three

    broad offerings as explained below.

    Infrastructure as a Service (IaaS): In IaaS,

    clients hire raw computing power such as

    CPU, disk storage and network resources.IaaS analysis must include not only the cost

    of the computing resources but also the whole

    operational and management environment

    required.

    Platform as a Service (PaaS): Paas involves

    pay-per-use for an application platform

    which provides tools to develop and maintain

    specific business applications. PaaS should be

    considered only if significant benefits on cost,

    flexibility, development effort and life cycle

    management can be obtained as compared toother options including in-house development.

    Software as a Service (SaaS): SaaS involves

    hiring a ready-to-use hosted product that

    requires minimum or no customization to

    meet business requirements. Selecting a SaaS

    solution requires more attention as compared to

    other cloud services as a best-of-breed solution

    might fit the business need but may result in

    creating new silos in the IT landscape.

    IMPACT OF ENTERPRISE INFORMATION

    MANAGEMENT

    There is a clear shift from the traditional

    reporting mindset to more analytical approach

    to enterprise information. The second step

    is assimilating structured and unstructured

    information and delivering key insights to

    stakeholders on a timely basis. There are

    several areas that need to be addressed.

    Master Data Management (MDM):To specify

    set of processes and tools that denes and manages

    key data entities to ensure a single version of truth.

    ERP Systems: Several organizations have

    ERP/CRM packages that are rich sources of

    critical information. However, inter-operability

    issues lead to data non-availability andinconsistencies.

    Data Warehousing/BI:Legacy systems that are

    focused on transaction reporting and which

    require a strategic re-focus to deliver predictive

    capabilities to aid decision making.

    Enterprise Content Management:Provides

    processes and tools to store and organize

    unstructured data, for e.g., documents, wikis,

    emails and information portals.

  • 8/12/2019 Systems Integration (1)

    20/76

    18

    Enterprise Search: It is the process of makingavailable information from various sources

    searchable for given audience. This would

    require strict access management to ensure data

    condentiality.

    Event Capture:Unexpected or atypical actions

    by signicant volume of customers or vendors

    should be captured and escalated quickly to

    senior stakeholders. This is more strategic for

    B2C rms, for e.g., banking, retail and services

    to take proactive steps to analyze and respond

    faster.

    ROLE OF SYSTEM INTEGRATORS

    SIs today possess the business and technology

    skills to build a comprehensive enterprise

    architecture that will help align IT investments

    with a long term business strategy and help

    reduce organizational complexity by making

    applications interoperable. Also they are

    capable of integrating emerging disruptivetechnologies while keeping total cost of

    ownership under check.

    There are four sub-architectures of enterprise

    architecture, viz.,

    Business: Business sub-architecture defines

    the business strategy, model, processes and

    the foundation for the other sub-architectures.

    Information: Information defines the data

    needs of the organization. It identifies and

    standardizes information, assigns ownership

    and accountability. The data exchange formats

    are also dened in this sub-architecture.

    Application: Application sub-architecture

    defines the application design patterns and

    enabling technologies. It also provides an

    overview on how the applications should

    be bundled to support a business process.

    Business Architecture

    describes the business

    strategy, models,

    processes, services and

    organisation. Provides the

    other enterprise architectue

    dimension base their

    decisions

    Technical

    Architecture

    Application

    Architecture

    Business

    Architecture InformationArchitecture

    Information Architecture identifies,

    documents and manages

    the information needs of the

    enterprise, assigns

    ownership and accountability

    for this information and

    describes how data is

    stored by and exchaged

    between stakeholders

    Application Architecture

    defines the specification

    of technology enabled

    solutions in support of the

    business architecture.

    Provides a view on how

    services should be bundled

    to support a business

    process

    Technical Architecture

    defines the strategies and

    standards for technologies

    and methods used to develop,

    execute and operate the

    application architecture.

    It provides frameworks, technical

    patterns and services that support

    application requirements

    Figure 2: Components of Enterprise Architecture Source: Infosys Research

  • 8/12/2019 Systems Integration (1)

    21/76

    19

    This also species the middleware and othersoftware applications.

    Technical:Technical sub-architecture specifies

    the strategies and standards for underlying

    netwwork and hardware that supports the

    application and information sub-layers. This

    sub-architecture lays down guidelines for

    data.

    Business Advisory Skills:Beyond technology

    capabilities, strong understanding of business

    processes and people management is very

    critical. Change management is often an

    underestimated factor in large transformational

    initiatives that often leads to failure.

    CRITICAL STEPS IN EXECUTION

    In order to succeed in the journey to become a

    smarter organization, following steps must be

    understood and executed.

    Right Mix in Leadership: Recognizing the

    transformational nature of this journe y, the

    leadership must include mix of business

    and technology leaders to define the road-

    map.

    Mission and Goals: A clearly articulated

    mission and goals in both business and ITterms should be published and communicated

    to all stakeholders. Periodic update meetings

    to review progress and update the roadmap

    are important.

    Business-led Metrics:Align the IT metrics and

    milestones with clear business goals. For e.g.,

    10% increase in new customer acquisition, or

    15% cap on custom applications. These new

    metrics will ensure IT architecture will be

    tightly aligned to business outcomes.

    Continued Executive Sponsorship: It is essentialto understand that transformation is an

    ongoing exercise that requires periodic reviews,

    assessment and re-alignment of goals and

    resources. Senior management must commit

    themselves to engage with IT leadership and

    vendors on an ongoing basis.

    WORKING IN MULTI VENDOR SCENARIO

    Increasingly clients are choosing to work

    with fewer strategic vendors on large

    transformational initiatives. While this results

    in reduced total cost of ownership (TCO) and

    reduced program management efforts, it places

    greater responsibilities on system integrators to

    demonstrate depth in capabilities and resource

    scalability. Vendor selection and appropriate

    governance mechanism needs to be put into place.

    It is essential for key IT initiatives to be linked

    clearly with business objectives. By creating

    responsibility matrix for all stakeholders such

    as RACI (Responsible, Accountable, Consulted,

    Informed), vendors and client stakeholders

    can work closely on shared understanding of

    business goals and IT priorities.

    CONCLUSION

    Traditionally IT was viewed a support

    function and was dealt with tactically. Years ofinconsistent IT strategy and ad-hoc technology

    adoptions leaves an organizations IT landscape

    with several silos and inefciencies. This has

    led to adverse impact in business process

    efficiencies and thus the ability to serve

    customers better. The unwieldy IT systems erode

    an organizations ability to compete effectively

    in an uncertain business environment.

    The new disruptive technology waves

    like cloud computing and mobility can lead

    to new technology silos and increase system

  • 8/12/2019 Systems Integration (1)

    22/76

    20

    integration and maintenance costs in the future.Therefore, for an organization to become

    smarter it is essential to address enterprise

    complexity, by building exible, cost effective

    IT systems, creating a learning environment

    where employees, customers and vendors can

    communicate and collaborate in real time. This

    will help organizations adapt faster to key

    organizational challenges.

    In order to achieve these goals, smarter

    organizations are increasingly investing in

    enterprise architectures that have defined

    business ob jec t ives and s t ra tegies to

    streamline business processes and deliver on

    organizational information needs. SIs today

    have business and technology expertise to

    help organizations simplify their IT landscape

    and leverage technology to create a learning

    environment.

    REFERENCES

    1. Gomolski , B. and Potter K. (2009),

    Integrated IT Spending Perspectives,

    G a r t n e r R e s e a r c h . A v a i l a b l e a t

    h t t p : / / w w w . g a r t n e r . c o m / i t /

    content/1303700/1303722/march_17_

    gar tner_ integrated_i t_spending_

    perspectives_kpotter.pdf.

    2. Kisker, H., et al. (2010), The State Of

    Enterprise Software And EmergingTrends: 2010 Forrester Research. Available

    at http://www.forrester.com/rb/

    Research/state_of_enterprise_software_

    and_emerging_trends/q/id/55802/t/2.

    3 . Janaki Akella , J . et a l . (2009) , ITArchi tec ture : Cut t ing costs and

    Complexity, Mckinsey Quarterly.

    Available at http://www.mckinsey.

    de/downloads/publikation/mck_on_

    bt/2009/mck_on_bt_16_it_architecture.

    pdf.

    4. Heffner R., Cullen A., An M. (2010).

    Top Priority For Cloud Planning:

    Integrate Cloud Computing Into Existing

    Architecture Strategies. Dont Fall For

    Hype Build A Strong Foundation

    F o r Y o u r A p p r o a c h T o C l o u d .

    Available at http://www.forrester.

    com/rb/Research/top_priority_for_

    cloud_planning_integrate_cloud/q/

    id/56548/t/2.

    5. Sohel, A., Obitz, T., Modi, R., Sarkar,

    S.(2005). Enterprise Architecture: A

    Governance Framework. Available at

    http://www.infosys.com/consulting/

    architecture-services/white-papers/

    Documents/EA-governance-1.pdf.

    6. White, M. and Briggs, B. (2010), Depth

    Perception: A dozen technology trends

    shaping business and IT. Available

    a t h t t p : / / w w w . d e l o i t t e . c o m /

    us/2010technologytrends.

    7. Goel, M. (2009), Are you plagued with

    unnecessary costs in your IT projects?SETLabs Briengs Journal, Vol 7 ,No

    4 ,pp 4-10. Available at http://www.

    infosys.com/infosys-labs/publications/

    Documents/OLAR-project-costs.pdf

  • 8/12/2019 Systems Integration (1)

    23/76

    21

    VOL 10 NO 22012

    Effectiveness of EA Frameworksin Achieving BITA:

    An Analysis Based on SAMM

    By Ramkumar Dargha

    Infosys Labs Briefings

    Business IT Alignment (BITA) is oneof the main goals of any enterprisearchitecture (EA) initiatives. EA frameworks

    like ZACHMAN [1], TOGAF [2], and FEA [3]

    help organizations in their EA journey and

    are expected to help achieve BITA goals. But

    questions that constantly get probed like (a)how far the EA frameworks help in achieving

    BITA; (b) what kind of support they provide and

    what they do not; (c) whether they cover aspects

    of aligning business to IT or IT to business, help

    in assessing the utility and relevance of such

    frameworks.

    Among the many BITA effectiveness

    measurement models available in literature,

    the strategic alignment maturity assessment

    model (SAMM) by Luftman et al [4] is the most

    comprehensive model that is typically used to

    assess the BITA alignment in an enterprise.

    The 40+ factors provided in this model can

    also be used as an assessment model to assess

    the capability and support provide by other

    EA frameworks for achieving BITA. This

    paper attempts at applying the SAMM model

    to the popular EA frameworks like TOGAF,ZACHMAN, etc., to analyze the effectiveness

    of the support provided by these frameworks

    in achieving BITA.

    BUSINESS AND IT ALIGNMENT

    BITA is the degree to which the enterprise

    business components composing of business

    models, business strategy, processes and

    business organization are aligned with IT

    infrastructure, IT applications, IT architecture

    and IT organization or vice versa. Traditionally,

    BITA is the degree to which the enterprisebusiness components composing of business

    models, business strategy, processes and

    business organization are aligned with IT

  • 8/12/2019 Systems Integration (1)

    24/76

    22

    BITA meant referred to IT aligning with business.However, today enterprises have realized that

    businesses too need to be aligned to IT. ITs

    alignment with business or business alignment

    with IT are not mutually exclusive. They co-

    exist with alignment being the core point of

    focus. SAMM allows one to analyze both the

    perspectives. SAMM provides a set of criteria

    that can be used to assess EA frameworks ability

    and support to achieve BITA alignment. The

    model captures different factors that determine

    BITA effectiveness. SAMM organizes these

    factors into six categories, viz., communication,

    value measurement, governance, partnership,

    scope and architecture, and skills maturity.

    ANALYSIS OF EA FRAMEWORKS

    USING SAMM MODEL

    While there are multiple EA frameworks in

    literature, it is important to restrict the scope

    of this study to the most popular few to assess

    if they are able to satisfy the different criteria

    set by SAMM, thereby addressing the BITA

    needs of an enterprise. For the purpose of this

    study only a select few popular frameworks are

    considered and they are analyzed against the

    six criteria laid out of SAMM.

    Communication Maturity

    TOGAFs Architecture Development Method(ADM) is a popular method to develop

    enterprise architecture. In addition to ADM,

    TOGAF provides clear definitions, content

    frameworks, templates, matrices, artifacts,

    guidelines, techniques and reference models

    for different components of architectures.

    TOGAFs capability framework provides

    guidelines on processes, skills, roles and

    responsibilities required for establishing and

    operating architecture functional group within

    an enterprise.

    So how do all these help in meeting therequired communication criteria prescribed by

    SAMM model for BITA?

    Artifacts and repository created as

    part of TOGAFs architecture vision phase

    helps communicate the vision, mission, goals,

    drivers, value propositions, constraints, key

    performance indicators (KPIs), risks, mitigation

    activities and high level business, information,

    application and technology architecture of EA

    initiative. Stockholder expectations capture

    stakeholders, their concerns and requirements

    that is one of the first steps in creating the

    communication plan.

    The set of standard architectural

    content and deliverables like architectural

    building blocks, architecture contract ,

    principles, requirements, roadmap, models,

    change management plans, implementation

    plan, compliance plan and other standard

    architecture contents, as dened in TOGAF and

    more elaborately in ZACHMAN framework,

    provide a strong means of communication to

    all stakeholders.

    ZACHMAN frameworks specific

    emphasis on architectural artifacts for different

    perspectives/roles (like planner, owner,

    designer, builder and subcontractor) and for

    different aspects (what, how, where, who and

    when) enables enterprises to create detailedartifacts that links the needs of different roles

    and lifecycle stages, and thus plays a key role in

    helping IT understand business and vice versa.

    The goal of FEA frameworks

    reference models is to facilitate communication,

    cooperat ion, and col laborat ion across

    organizational boundaries.

    Liaison effectiveness that is an important

    factor in SAMMs communication criterion can

    be incorporated as part of the EA architecture

    governance board or architecture capability

  • 8/12/2019 Systems Integration (1)

    25/76

    23

    group. However, effectiveness measurementof such a liaison activity needs to be added

    to the architecture performance measurement

    framework.

    The EA frameworks thus do a good job in

    helping to achieve four of the six communication

    needs as outlined by SAMM viz., understanding

    of business by IT, understanding of IT by

    business, inter/intra organization learning,

    liaison effectiveness.

    However, some gaps still exist in the three

    frameworks, with respect to the remaining two

    communications criteria. . For example, there

    are no specic guidelines on communication

    protocol exibility or protocol rigidity in the EA

    frameworks. Also they do not elaborate much

    on the communication plan aspects.

    In addition, the frameworks do not

    provide any specic guidelines for knowledge

    sharing. Knowledge sharing is an important

    element in the communication criteria as

    laid out in SAMM. A typical knowledge

    management initiative should take into account

    the following four aspects:

    Technology: These are the enabling

    technologies that help in knowledge

    gathering, creation, storing, distribution

    and enhancement.

    People: Issues related to motivating

    employees and other participants in

    knowledge creation and sharing.

    Processes: Issues related to knowledge

    creation process, knowledge protection,

    IP and legal aspects.

    Culture: Issues related to cultivating

    the overall organizational culture of

    openness.

    Value Measurements MaturityIt refers to the measurement of value that IT

    as a whole brings to business. Measuring such

    a value effectively and making improvements

    based on such value measurements is one

    of the main criteria to measure BITA as

    per SAMM. So the question is that of how

    EA frameworks through their guidelines,

    processes and recommendations help in IT

    value measurement.

    TOGAF has a section on performance

    measurements within the architecture

    governance module where EA performance

    evaluation and business value evaluation of

    such architecture is covered briey. ZACHMAN

    framework also mentions about the importance

    of capturing business value achieved in the

    cells corresponding why aspect and planner/

    owner perspectives. But the EA frameworks

    do not provide comprehensive guidelines

    and recommendations on how to measure

    the business value of IT as a whole. These EA

    frameworks need to be supplemented with other

    standard IT measurement frameworks like -

    Business Vaue Index (BVI): Used by

    enterprises that are new to IT value

    measurements as initial steps to IT value

    measurement [5].

    Total Economic Impact (TEI): From

    the Forrester stable, this is a stronger

    quantitative framework compared to

    BVI. A big advantage of this method

    is that it measures intangibles such as

    exibility of IT as well [6].

    Val IT: An IT Governance Institute

    (ITGI) framework this is used mainly for

    evaluating new investments rather than

    current ongoing IT projects.

  • 8/12/2019 Systems Integration (1)

    26/76

    24

    Applied Information Economics(AEI) : Very quantitative in nature it

    is extremely complex in its nature but

    presents the most accurate net present

    value (NPV) analysis [7].

    SAMM recommends measuring business

    value through a balanced metrics approach

    which essentially is the combination

    of business and IT metrics. The listed

    standard IT measurement frameworks

    when applied with EA frameworks help

    achieve the value measurements criterion

    as prescribed by SAMM.

    Governance Maturity

    There are multiple types of governance that

    are of importance to an enterprise, viz.,

    corporate governance, IT governance and

    architecture governance. SAMM deals with IT

    and architecture governance aspects. The EA

    frameworks like TOGAF and FEA deal mainly

    with architecture governance. IT governance is

    a much broader than architecture governance.

    Forrester defines IT Governance as the

    process by which decisions are made around

    IT investments. How decisions are made? Who

    makes the decisions? Who is held accountable,

    how the results of decisions are measured and

    monitored are all parts of IT governance? [8].TOGAF has a comprehensive architecture

    governance framework consisting of context,

    process, content, repository, monitoring,

    reporting, structure, key success factors and

    compliance guidelines. But the EA frameworks

    do not have similar coverage for IT governance

    and IT service level governance.

    Enterprises have to use additional

    governance frameworks like COBIT, ITIL and

    COSO to meet the overall IT governance needs

    [9, 10, 11].

    C O B I T p r o v i d e s t h e m o s tcomprehensive governance framework with a

    strong focus on process of governance, strong

    auditing and controls perspectives. While

    ITIL provides a framework for IT service

    management, COBIT takes the perspective of

    audit and control.

    Other governance frameworks like

    Forrester framework organize governance

    around three main categories, viz., governance

    structures, governance processes, and

    governance communication. While the last

    two aspects are addressed in COBIT and ITIL

    to a certain degree, the Forrester framework

    provides additional emphasis on governance

    structures and reporting structures.

    By using above frameworks in unison

    with EA frameworks the enterprises would be

    able to satisfy governance needs as set forth

    by SAMM.

    Partnership Maturity

    The EA frameworks do not deal with business-

    IT partnership model or guidelines explicitly.

    But the EA frameworks implicitly capture

    some of the important aspects required for

    an effective business-IT partnership. Before

    analyzing EA frameworks support for such a

    relationship, let us look at some of the typical

    key ingredients of a good partnership model.A partnership model is typically comprised

    of some key ingredients like (a) drivers that

    are a compelling reason to partner and that

    set expectations on outcomes; (b) components

    that joint activities and processes that build

    and sustain the partnership; (c) facilitators

    that enhance partnership growth; (d) outcomes

    that refer to the extent performance meets

    expectations; and (e) feedback that essentially

    refers to the inputs given by partners for

    continuous improvement.

  • 8/12/2019 Systems Integration (1)

    27/76

    25

    Let us now analyze EA frameworkssupport in implementing a successful

    partnership model.

    Drivers: This aspect is actually an enterprise

    level responsibility and is out of scope for a

    typical EA framework. These drivers would

    be set before venturing into an EA program.

    Components: The EA frameworks propose

    and recommend many activities and processes

    that not only help in creating a good EA, but

    indirectly help in building and sustaining

    business-IT partnership. In TOGAFs ADM

    model, almost all activities have both business

    and IT aspects. For example, the stakeholder

    lists for each activity and deliverable include IT

    and business representatives, the architecture

    governance board and architecture center of

    excellence (COE) will have representatives

    from both IT and business. In addition, the

    architecture implementation starts with

    business architecture with due importance given

    to linking business architecture to subsequent

    IT architectural components like information,

    application and technology architectures.

    Finally, business viewpoints are included in

    each of the IT architecture artifacts as proposed

    by TOGAF and ZACHMAN drives business-IT

    collaboration. All these contribute to the core

    components on which a business-IT partnershipcan prosper and function effectively.

    Facilitators: The EA frameworks propose and

    recommend setting up of architecture governance

    board and architecture capability function or

    COE. They also recommend representation of

    both business and IT groups in these boards and

    COEs. These boards/COEs and in addition to

    focused/dedicated liaison teams can perform

    the role of facilitators in building trust and

    partnership between business and IT.

    Outcomes: The most important outcomeof effective business-IT partnership would

    be to achieve the goals of IT as required by

    business. Though EA frameworks themselves

    do not cover the metrics and performance

    measurement in great detail, there are other

    additional frameworks that can supplement to

    achieve the outcomes.

    Feedback: Facilitators and outcomes play an

    important role in the feedback mechanism.

    In addition, the stakeholder communication

    section in the communication plan needs

    to incorporate required formal feedback

    mechanisms for IT-business partnership for the

    purpose of continuous improvements.

    As can be seen f rom the above

    analysis, though the EA frameworks do not

    explicitly address the business-IT partnership

    needs, there are inherent mechanisms as

    recommended by these EA frameworks

    that can be utilized for such an effective

    partnership model.

    So how do all these match up to

    SAMMs maturity criteria? The combination

    of components, facilitators, outcomes and

    feedback together can help improve business

    perception of IT value and can enhance mutual

    trust resulting in shared goals, risks and

    rewards, all of which are important criteria inSAAM for achieving an effective business-IT

    partnership model.

    Scope and Architecture Maturity

    SAMMs scope and architecture component

    measures ITs ability to create a flexible

    infrastructure, its ability to evaluate and apply

    emerging technologies, its ability to enable

    or drive business process changes, and its

    delivery of valuable customized solutions to

    internal business units and external customers

  • 8/12/2019 Systems Integration (1)

    28/76

    26

    or partners [12]. This component answerssome of the questions like: To what extent has

    IT evolved to become more than just business

    support? How has IT helped the business

    to grow, compete and prot? The criterion

    covers two important items: (i) ITs ability to

    create exible IT systems to satisfy the ever

    changing business needs in an agile and efcient

    manner; and (ii) ITs ability to perform the role

    of a business enabler or driver rather than

    just as business support or business process

    automation function.

    The first aspect above is addressed

    to a great extent in EA frameworks. For

    instance, both TOGAF and FEA EA frameworks

    lay significant emphasis on technology,

    information, security and implementation

    standards. In all EA deliverables prescribed

    by TOGAF, compliance to standards is given a

    very important role. TOGAF includes separate

    sections on technologies and frameworks that

    enable implementation of a standard and exible

    architecture. Standards information base (SIB)

    is one of the main components of TOGAFs

    architecture repository. The SIB captures the

    standards with which new architectures must

    comply, which may include industry standards,

    selected products and services from suppliers,

    or shared services already deployed within the

    organization. TOGAF also prescribes usingother related standard frameworks like ITIL,

    CMMI, COBIT, PRINCE2, PMBOK as applicable

    in different phases of EA implementation

    cycle[13,14].

    FEA too recommends application

    development, technology implementation,

    project management, governance, vendor

    management, production operation, architecture

    governance, conguration management and

    problem resolution in every phase of EA

    lifecycle implementation.

    Standards and flexible architecturesprescribed by EA frameworks provide a

    mechanism to create flexible and standards

    based IT infrastructures that are more amenable

    for implementing an agile and efcient system. .

    Standard and exible architectures satisfy

    SAMMs criteria like standard articulation,

    architectural integrat ion, architectural

    transparency and exibility.

    Skills Maturity

    EA frameworks provide a comprehensive

    coverage on the skills denition and depth of

    knowledge required by different roles in an EA

    team. TOGAF covers skills from different skill

    dimensions viz., generic skills, business skills,

    EA skills, program/project management skills,

    IT general knowledge skills, technical IT skills

    and legal environment skills) and also covers

    different roles viz., architect board member,

    architect sponsor, EA manager, technology/

    data/application architects, managers and IT

    designers in each of the dimensions.

    B y f o l l o w i n g t h e g u i d e l i n e s a n d

    recommendations prescribed by TOGAF

    as above, an enterprise would be able to

    satisfy most of the skills criteria set forth by

    SAMM. But few other criteria like innovation,

    entrepreneurship, locus of power, trusting

    environment and career crossover havemore to do with generic organization skills/

    capabilities, for which enterprises need to

    leverage standard practices available in

    organizational management literature.

    CONCLUSIONS

    A thorough evaluation of EA frameworks

    against the canvas of SAMM suggests that

    they are riddled with the lacunae of being

    reactive frameworks. Hence, it would do

    well for an enterprise architect to adopt an

  • 8/12/2019 Systems Integration (1)

    29/76

    27

    extended framework that consists of the

    current EA frameworks along with some key

    supplementary frameworks and that meet the

    criteria set forth by SAMM to achieve awless

    BITA [Fig 1].

    Using this extended framework, an enterprise

    can proactively take measures and employ

    practices to satisfy BITA needs rather than rst

    discovering gaps and then taking measureswhile implementing an EA initiative.

    Compared to TOGAF, ZACHMAN and

    the like, it is more comprehensive and enhances

    the repertoire of tools that an EA consultant can

    have before embarking on an EA engagement.

    It denes a pre-dened set of tools/frameworks

    that an EA consultant can pick and choose

    during an EA engagement. This increases the

    predictability of success of an EA engagement

    and reduces time to get started on such an

    engagement.

    It must however be understood that the

    extended framework does not re-invent the

    wheel but uses the existing frameworks like

    TOGAF, ZACHMAN and builds on top of these

    frameworks to address the gaps in order to meet

    the BITA needs.

    REFERENCES

    1. The Zachman Framework. Available

    at http://en.wikipedia.org/wiki/Zachman_Framework

    2. TOGAF Framework. Available at http://

    www.opengroup.org/togaf/

    3. FEA Enterprise Architecture. Available at

    http://en.wikipedia.org/wiki/Federal_

    Enterprise_Architecture

    4. Luftman J., (2000) et al, Assessing Business

    IT alignment Maturity, Communications

    of the Association for Information Systems

    AIS, Vol. 4, Issue 14. Available at http://

    aisel.aisnet.org/cais/vol4/iss1/14

    Business IT

    Alignment

    EA Frameworks

    EA Frameworks

    Skills

    Organization Learning

    Model

    Innovation Management

    Model

    Scope and Architecture

    IT driven BPR frameworks

    Extended BPR frameworks

    Industry Case Studies

    Communication

    Knowledge

    Management Tools

    Specialist Liaison Groups

    Flexible Protocol Structures

    Value Measurements

    Business Value Index

    Val IT Model

    TEI Model

    AIE Model

    IT Balanced Scorecard

    Partnerships

    Trust based Strategic

    Partnership Models

    Cross Participation

    Team Effectiveness

    Models

    Governance

    COBIT

    ITIL

    COSO

    ISO 17799

    Figure 1: Extended BITA Framework Source: Infosys Research

  • 8/12/2019 Systems Integration (1)

    30/76

  • 8/12/2019 Systems Integration (1)

    31/76

    29

    VOL 10 NO 22012

    Proactive performance engineering holds thekey to improving performance and scalabilityrequirements in a modernization initiative

    Proactive PerformanceEngineering for

    E-commerce ModernizationBy Saurabh Kumar Mishra, Balaji Subbaraman and Rohit Christopher

    Infosys Labs Briefings