DRAFT - Classified Technical Solutions Face to Face Agenda

 

Committee Meeting Agenda/Notes

 

Committee Meeting Agenda/Notes

Date

April 29th - May 2nd

Attendees

Future Meetings

Time

Time:

Location

TBD

Dates:

Facilitator

Deirdre Peters

Conference Call Details

Access Code

 

Goal I: Current State, Roles and Responsibilities

Agenda Item(s) / Discussion

Attachments:

Presenter

Motion

Second

Approved

Current State - Assess the existing ERP infrastructure, applications, hosting and security protocols to understand the baseline.









Team Roles and Responsibilities - Identify team members responsible for various aspects such as infrastructure management, application deployment, security implementation, and ongoing maintenance.









Known Risks - Document and mitigate identified risks such as data breaches, system downtime, compatibility issues, and compliance challenges.

 

 

 

 

 

Goal II: Future State

Agenda Item(s) / Discussion

Attachments:

Action

Motion

Second

Approved

Future State - Define the desired outcomes and improvements for the ERP deployment, including scalability, efficiency, and enhanced security measures.









Team Roles and Responsibilities - Identify team members responsible for various aspects such as infrastructure management, application deployment, security implementation, and ongoing maintenance.









Known Risks - Document and mitigate identified risks such as data breaches, system downtime, compatibility issues, and compliance challenges.

 

 

 

 

 

Unknown Risks - Potential risks that may arise during deployment and establish contingency plans to address them as they emerge.

 

 

 

 

 

Technical Limitations - Constraints or limitations within the current infrastructure, such as hardware capabilities, software compatibility, or bandwidth constraints, that may impact deployment.

 

 

 

 

 

Operations and Maintenance Model - Define processes and procedures for ongoing operations, including monitoring system performance, implementing updates and patches, managing user access, and ensuring data integrity.

 

 

 

 

 

Goal III: Application Deep Dive

Agenda Item(s) / Discussion

Attachments:

Action

Motion

Second

Approved

Functionality - Explore functionalities within each module and how they align with classified business requirements.









Customization - Discuss ERP application customizations to meet classified business processes. Examine the feasibility and implications of customization in terms of cost, time, and ongoing maintenance. 









Third-Party Integration - Analyze integration capabilities of the ERP application and discuss integration strategies to streamline data flow and optimize processes.

 

 

 

 

 

Legacy Systems - Explore integration options to ensure smooth data migration and interoperability between the ERP application and existing systems.

 

 

 

 

 

User Experience -

  • Interface Design - Assess the user interface design of the ERP application. Focus on applicable value stream interface functional specs.

  • Training and Support - Discuss training programs and support resources to help classified end users effectively utilize the application and troubleshoot issues.

 

 

 

 

 

Scalability and Performance -

  • Scalability - Evaluate the scalability of the ERP application to accommodate growth in data volume, user base, and transactional throughput over time. Discuss scalability considerations such as hardware requirements, database optimization, and cloud hosting options.

  • Performance Optimization - Identify performance bottlenecks and optimization strategies to ensure fast response times and efficient use of system resources.

 

 

 

 

 

Security

  • Data Security - Examine the data security features of the ERP application, including encryption, access controls, and audit trails, to protect sensitive information from unauthorized access or data breaches.

  • Compliance - Discuss how the ERP application addresses Classified customer compliance requirements.

 

 

 

 

 

Goal IV: Hosting Deep Dive

Agenda Item(s) / Discussion

Attachments:

Action

Motion

Second

Approved

Cloud Hosting - Explore the benefits of cloud hosting, such as scalability, flexibility, and access to advanced security features and infrastructure managed by the cloud provider.



 

 

 

Infrastructure Requirements -

  • Hardware - Evaluate the hardware requirements for hosting the ERP system, including server specifications, storage capacity, and network infrastructure.

  • Software - Discuss the software components needed to support the ERP application, such as operating systems, database management systems, and middleware.

  • Virtualization - Consider use of virtualization technologies such as hypervisors and containerization to optimize resource utilization and streamline management. 



 

 

 

Scalability and Performance

  • Scalability - Assess the scalability options available for cloud hosting, including vertical scaling (adding more resources to existing servers) and horizontal scaling (adding more servers).

  • Performance Monitoring - Discuss strategies for monitoring system performance, identifying bottlenecks, and optimizing resource allocation to ensure optimal performance for users. 

 

 

 

 

 

High Availability and Disaster Recovery

  • High Availability - Explore high availability solutions such as clustering, load balancing, and redundant hardware configurations to minimize downtime and ensure continuous access to the ERP system.

  • Disaster Recovery - Develop a comprehensive disaster recovery plan that includes regular backups, data replication, failover mechanisms, and off-site storage to protect against data loss and service interruptions. 

 

 

 

 

 

Security

  • Network Security - Network security measures such as firewalls, intrusion detection/prevention systems (IDS/IPS), and virtual private networks (VPNs) to protect against unauthorized access and cyber threats.

  • Data Security - Discuss access controls and authentication mechanisms, auditing and logging to maintain data integrity and confidentiality.

 

 

 

 

 

Goal V: Infrastructure Deep Dive

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Action Items