Application Portfolio Assessment – During the application portfolio assessment, we work side by side with you to do a high level walkthrough of your application portfolio looking for legacy applications that can be archived. Once a subset of candidate legacy applications have been identified, a second more detailed review is conducted to validate the application as an archive candidate. Additional information is gathered from the SME regarding application characteristics that are pertinent to a successful application archive process.
Application Archive Proof of Concept – The application archive proof of concept is a simplistic application archive process to demonstrate capability. One application from the application portfolio process is targeted for the POC to help demonstrate the archive capability and a simplistic user interface. This facilitates discussion around what an archive will look like and how we will partner together during the application archive project.
Application Archive Project – The application archive project is a full scale application archive initiative. The project consists of scheduling the archive candidates, archiving application data, validating the archive, generating query screens, assembling system documentation, and performing a knowledge transfer.
Application Archive Governance Board – Application archive governance board helps you establish a repeatable application archive process. It outlines the high level process to continuously assess your application portfolio looking for archive candidates so that you continue to run a lean application portfolio and archive applications as needed. The governance board will own the archive process to make sure that pertinent application information is gathered for each archive candidate, and to ensure proper documentation is kept to prove immutability and chain of custody. In addition, the application archive governance board will be the ruling body to ensure the repository is well maintained for future use.
Detailed Data Forensics – Detailed data forensics performs analysis on the application data and its data structures looking for anomalies that require investigation. Documentation is compiled for the application to explain the anomalies for data integrity. This is frequently applied to applications that are part of a legal matter or in legal hold.