Upload
bhatdinu
View
219
Download
0
Embed Size (px)
Citation preview
8/8/2019 WW_ApplicationScoringMatrix
1/21
Project
Title
Project or Investment Title
Description of Project or Investme
Last updated By:
Last updated Date:
Fill in the following informatibrief description of it. Th
8/8/2019 WW_ApplicationScoringMatrix
2/21
Application Information
Sample Project
Sproject Sponsor's email address
Title of the project
High level title of the project
Dinesh Bhat
9/19/2010
ion, including the title of your investment or project and ais information will be included on the summary report.
8/8/2019 WW_ApplicationScoringMatrix
3/21
Weightings
Weight each of the following categories. All categories should be included, and the weig
Category Description
Business
Application
Technology
This category refers to the importance of advisor first,organizational alignment and vision, business continuity,
compliance, Partners and data
This category refers to the importance the underlying technologiesand interoperability of any system. These should align closely withWellington West's strategic technology standards.
This category refers to the importance the security standards and
underlying technologies related this area. The ability to controldifferent levels of authorization and authentication must have aclose fit to the Wellington West's strategic technology standards.
8/8/2019 WW_ApplicationScoringMatrix
4/21
htings should total 100%.
Weighting Comments
40%
30%
30%
100%
8/8/2019 WW_ApplicationScoringMatrix
5/21
Category
Advisor First
Business Continuity
Compliance with regulators
Partners are strategic
Data is an asset
Total
Organization alignment ofbusiness strategy and vision
8/8/2019 WW_ApplicationScoringMatrix
6/21
Category:
Description
Total 'Business' Weighting
Material changes to client product offerings, servicesand advisor facing technology, will not occur withoutadvisors being consulted as a key stakeholder.
Decisions at all levels in the organization will be madeto maximize the overall business strategy and vision.
Critical enterprise operations are maintained in spite ofsystem interruptions.
Enterprise information management processes complywith all relevant laws, policies, and regulations.
Enterprise information management processes complywith all relevant laws, policies, and regulations.
Data is an asset that has value to the enterprise and ismanaged.
8/8/2019 WW_ApplicationScoringMatrix
7/21
USINESS
Examples
Does the advisor community want this new services?
1
1
1
0
2
2
7
WeightingFit = 2 Partially = 1 NoFit = 0
Does this new service caters to a wealth managementplatform and a proprietary investment philosophy (i.e.Core & Explore)Does this new service position customer service to anadvisor team as a competitive advantage?
Is the new service a business critical system in terms ofbusiness principles?
Is compliance approval required?Does the new service meet the requirements ofcompliance department?
Does this service enable seamless technical integrationbetween different functions and partners?
Does this new service give the firm the ability to reporton reliable data in a consistent format?
8/8/2019 WW_ApplicationScoringMatrix
8/21
Comments
8/8/2019 WW_ApplicationScoringMatrix
9/21
Category
Common use applicati
Ease of use
Application Availabilit
Capacity Benchmarks
Release and Deployme
Documentation
Disaster Recovery
Application Security
Total
8/8/2019 WW_ApplicationScoringMatrix
10/21
Catego
Description
Ease of application deployment.
Availability of user guides and administration guides
Total 'Application' Weighting
Applications used across the enterprise are preferred over similar orduplicative applications which are only provided to a particular part of theorganization.
Look, feel and usability of applications are standardized. The underlyingtechnology is transparent to users, so they can concentrate on tasks athand.
Availability (see service level agreement). Targets set for availability canbe obtained from the SLA documents
Capacity and future growth must be considered to review the benchmarkstats of the application
Backups and maintainability details of the application must be provided towork with the DR strategy of the business
Applications used must comply with the security protocols adopted by theenterprise
8/8/2019 WW_ApplicationScoringMatrix
11/21
ry: APPLICATION
Examples
Does the new system provide seamless integration between differentfunctions and different business units within the application?Does the new system provide consistent processes and workflowmanagement across the entire organization?
The new system should not introduce redundant functionality.
Does the new system provide single sign on for integration with theportal?Does this system provide the capability to Wellingtonize the look and feel?
Is the new service reliable in terms of accessibility and performance?Does the new service meet user-defined requirements for functionalityand service levels?
Can the new service handle current WW user base and also the futuregrowth without requiring additiona efforts?
Is systems training required for WW IT to handle the release anddeployment of the new service?
Does the new service provide relevant documentation for WW end usersand technology users?
Does the new service require hosting space at Wellington West?Does the service meet WW service levels to maintain business continuity?
Does the new service provide LDAP-based access control for Single SignOn?Does the new service provide adequate security that falls in line with thesecurity protocols supported at WW?Are there any security concerns with the new system?Will the system behandling sensitive data now, or in the future?
8/8/2019 WW_ApplicationScoringMatrix
12/21
Comments
0
0
2
0
1
1
0
2
6
WeightingFit = 2 Partially = 1 No Fit = 0
8/8/2019 WW_ApplicationScoringMatrix
13/21
CategoryTechology Standards worksheet describes the indus
Category Description
Control Technical Diversit
Interoperability
Buy Vs. Build
IT Responsibilities
Total Total 'Technology' Weighting
Technological diversity is controlled to minimize the non-trivial cost of maintaining expertise in and connectivitybetween multiple processing environments.
Software and hardware should conform to defined standardsthat promote interoperability for data, applications, andtechnology.
We will investigate packaged applications first to see if theymeet our requirements.
The IT organization is responsible for owning and
implementing IT processes and technology that enablesolutions to meet user-defined requirements for functionalityand service levels.
8/8/2019 WW_ApplicationScoringMatrix
14/21
TECHNOLOGYtry standards. Weighting for technology should consider these sta
Examples
Does the service require technology not supprted by WW?Does the service warrant developing technology expertise
not available at WW?Does the new service implement the functionalities that arealready offered by other existing applications?
Are there any security concerns with the new system?Willthe system be handling sensitive data now, or in the future?Will the system be handling sensitive data now, or in thefuture?
Can the new service be implemented in-house?Does the new system meet buy vs build policyrequirements?
Is the new system designed in such a way that application
speed and performance will meet expectations?Are new technology support skills required to support thenew system?
8/8/2019 WW_ApplicationScoringMatrix
15/21
dards.
Comments
2
0
2
0
4
WeightingFit = 2 Partially = 1 No Fit= 0
8/8/2019 WW_ApplicationScoringMatrix
16/21
Overview RSummary report from your assessment
Title Sample Project
E-Mail Sproject Sponsor's email ad
Project or Investment Title Title of the project
Description of Project or Inves High level title of the projec
Perspective Weighting (Percentage)
Business 40%
Application 30%
Technology 30%
Overall Score 100%
The table below is a broad outline for interpreting this score.
Interpretation of
Overall Score Range Interpretation
0%-25% Likely to be a very poor inve
26%-50% Has some potential, but will
51%-75% Likely a good investment, b76%-100% Solid investment.
The Weighting column in the table below represents the organicategory when evaluating IT investments. The Score column liinitiative scored against these priorities.
8/8/2019 WW_ApplicationScoringMatrix
17/21
sultss of the five perspectives.
ress
ighted Score (Percentag Score (Average)
28% 7
18% 6
12% 4
58% 17
Overall Scores
stment.
likely require significant modification before approval is fort
t may need some fine-tuning.
ization's input for the priority and importance of eachts the points (from 0 to 10) as to how well this particular
8/8/2019 WW_ApplicationScoringMatrix
18/21
Component Standard Standards Body
Interconnectivity
Web transport IETF/W3C
(RFC 2616)
Email transport Simple Mail Transfer Protocol SMTP IETF
(RFC2821.RFC2822)
Directory Lightweight Directory Access Protocol IETF
File transfer protocols FTP (RFC 959, RFC1579, RFC2428) IETF
Interoperability
Metadata/MetaLanguage XML (Extensible Markup Language) W3C
XML Metadata definition XML-Schema W3C
XML Data transformation XSL (Extensible Stylesheet Language) W3C
XML Data query Xpath W3C
XML Security mark-up OASIS
*Used by Ping Identity
Public Key Infrastructure X509v3 ITU-T
Minimum interoperable IETF
character set
XForms W3C
Web Services
Web service request delivery Simple Object Access Protocol SOAP W3C
V1.2
Web service request registry Universal Description, Discovery and OASIS
Integration UDDI v3.0
WSDL 1.1 W3C
Information Access
W3C
UTF-8/ASCII Formatted Text IETF
Open Document Format (ODF) v1.0 OASIS/ISO
(ISO26300) and later Oasis versions
IETF
Document formats for PDF Adobe
Hypertext Transfer Protocol HTTP
LDAP V3 (RFC4510) is to be used forgeneral-purpose directory useraccess.
SAML v2.0 (Security AssertionMarkup Language)
Transformation Format - 8 bit UTF-8(RFC3629), individual items in theXML schema may be furtherrestricted in character set on a case
Form Representation and
Data
Web service descriptionlanguage
Hypertext interchangeformats
Those parts of Hypertext MarkupLanguage HTML v4.0 and XHTML
implemented in common by Firefoxv2.0 or later, and MS InternetExplorer v6 or later, plus theirinteroperable extensions
Working Office Documentformats (word-processing,spreadsheet, presentation)
Comma-Separated RFC4180 Values(CSV)
8/8/2019 WW_ApplicationScoringMatrix
19/21
presentation view
Relational Database Access Structured Query language SQL-92 ANSI
Character sets and alphabets UNICODE ISO/IEC
ISO/IEC 10646-1:2000
Joint Photographic Experts Group /ISO ISO
standards 10918
Portable Network Graphics ISO
(ISO/IEC15948:2001)
For images that will not tolerate Adobe
information loss use tag Image File
Format (.tif)
Moving Picture Experts Group (.mpg) ISO
MPEG-1 (ISO/IEC 11172)
MPEG-2 (ISO/IEC 13818)
Browser scripting JavaScript (ECMA 262) ECMA
File compression gzip (RFC1951 and RFC1952) POSIX
zip (http://www.pkware.com) IETF
tar(POSIX.1-2001)
Systems
Relational Database MS SQL Server
Web Server Internet Information Server
Graphical/still imageinformation exchange
Multimedia audio/visualcontent
MPEG-4 and ogg
8/8/2019 WW_ApplicationScoringMatrix
20/21
implement thesestandards?Fit = 2 Partially = 1No Fit = 0
8/8/2019 WW_ApplicationScoringMatrix
21/21