The AdComp group at UCI underwent an exercise recently where they projected their "outlook" on various tools and technologies on a quarterly basis for four years.   They called it their "Guiding Principles" document and used the following codes:

Key

Meaning (from UCI Exercise)

W

Watch - This product has been placed on a watch list of technologies to follow. It has not been approved for use.

R

Research - Product should be used only for pre-approved, proof-of-concept projects. Technology may be under evaluation.

P

Pilot - Technology approved for small-scale production use only.

I

Invest - Technology recommended for wide-spread deployment.

C

Invest with Caution - Although this technology is regularly maintained and upgraded, it should be used only when alternative technologies are not feasible. Technology can only be used by exception, after review and approval by Administrative Computing Services Architectural Steering Committee.

M

Maintain - New implementations are not encouraged. Existing systems may continue to rely upon these components and extend existing implementations. Product may be maintained but not planned for upgrades except bug fixes.

D

Disinvest - Technology is in the process of being phased out.

O

Obsoleted - Vendor or industry support is gone. Tool should no longer be used.

V

Vetoed - Investigated and found not to meet organization's needs - rejected.

 We would like to undertake a similar exercise for a three year window.   We are not sure if we need to use all of the various keys that UCI did, but we need to come up with a list.   After that, we would like each CCDAT member to coordinate finding representatives for your respective divisions who can list the tools/technologies you support and fill out the matrix with our keys (to be determined) for the three year period.

Please fill in all the individuals in your division who will contribute to the architecture inventory:

ATA (Ron DiNapoli)

ATSUS (Todd Maniscalco)

NCS (Eric Cronise)

S&O (Laurie Collinsworth)

IS (Steve Barrett)

IT Security and IdM (Steve Edgar)

  • No labels