Approach to EA at Fujitsu and Relationships Between EA, SDAS, and SOA

Total Page:16

File Type:pdf, Size:1020Kb

Approach to EA at Fujitsu and Relationships Between EA, SDAS, and SOA Approach to EA at Fujitsu and Relationships between EA, SDAS, and SOA V Hiromi Matsuyama (Manuscript received March 13, 2006) Enterprise Architecture (EA) is an increasingly popular system that totally optimizes business and information systems by IT governance and adjustment of business and information strategies. The EA used at Fujitsu has features such as 1) an approach for realizing IT governance, 2) early development support of EA, and 3) smooth coopera- tion for operation and further development of EA. Our EA receives good reviews by providing a practical EA methodology in the form of a development and consulting service. From the viewpoint of System Development Architecture & Support facilities (SDAS), Fujitsu’s EA is not only positioned as an entry point that connects a business strategy with system requirements analysis, but also deeply incorporates the concept of SDAS into its methodology. This paper outlines EA, Fujitsu’s approach to EA, and the relationships between EA, SDAS, and Service-Oriented Architecture (SOA). 1. Introduction “enterprise-wide optimization” to quickly respond Enterprise Architecture (EA) is gaining to changes in the social environment and chang- attention as a mechanism that can totally es in information technologies. It organizes and optimize business and system operations by stra- systematizes business processes, information tegically aligning management strategies with system structures, and technologies to be used by information strategies and realizing IT gover- putting an entire organization into perspective. nance. EA is not only an upstream phase that In Japan, EA was first adopted by the links management strategies to System Develop- government in the autumn of 2002 for the ment Architecture & Support facilities (SDAS), improvement of e-government procurement pro- which is an integrated system development cesses. Then, in 2004, the government assigned methodology developed by Fujitsu, but also has a assistant Chief Information Officers (CIOs) to close relationship with SDAS from the viewpoint individual government agencies as EA promoters of smooth linkage with the development phase. to develop EAs for all projects relating to infor- This paper outlines EA and then describes mation systems by the end of fiscal year 2005. Fujitsu’s approach to EA and the relationships In addition, EA started to be applied in the with SDAS in the EA building process. It then private sector, centering largely on private enter- describes the interrelations between EA and prises facing a rapidly changing business Service-Oriented Architecture (SOA). environment, for example, automobile, electron- ic, and finance enterprises, and enterprises facing 2. Overview of EA a reorganization of their industry. Nowadays, the EA is a structure for improving business accelerated pace of change in business makes it operations and systems from the viewpoint of difficult to build systems to suit management 286 FUJITSU Sci. Tech. J., 42,3,p.286-294(July 2006) H. Matsuyama: Approach to EA at Fujitsu and Relationships between EA, SDAS, and SOA strategies. This trend has diverted the attention document form. Although they are the most im- of industries to EA as a mechanism for portant part of an EA, enterprises as well as appropriate investment and enterprise-wide IT government agencies are often unaware of their governance. It is believed that the application of importance. It should be noted that it is difficult EA will become an important issue that every or- to develop principles as one expects them to be, ganization and enterprise must consider. but that if consensus cannot be formed during the process of developing principles, the EA will be 3. Fujitsu’s approach to EA reduced to a dead architecture over the long term. 3.1 Definition of EA structure by Fujitsu 3) Architecture models There are a variety of EA frameworks. Architecture models are prerequisites for an Fujitsu defined a practical EA structure by EA. For the construction of specific IT systems, further improving the EA frameworks of the design and development will be implemented Japanese government, which were modeled after according to these architecture models. Fujitsu the Federal Enterprise Architecture Frameworks has divided them into the following four tiers (FEAF) of the U.S. (Figure 1). This structure based on the architecture models of the Japanese was also made public and was generally accepted. government. The following explains the six pillars of EA. • Business Architecture (BA) 1) EA governance • Data Architecture (DA) EA governance realizes basic control for • Application Architecture (AA) or Service implementing enterprise-wide optimization. All Architecture (SA) EA activities will be implemented under this EA •Technology Architecture (TA) governance. Organization-wide EA governance is These four tiers are described (modeled) with normally promoted by the information depart- respect to the As-Is model (or baseline architec- ments and the planning and development ture), which models current operations and departments of organizations, but dedicated teams systems; the Target model (or best practice), which are often formed for its promotion. presents improved operations and next systems; 2) Principles and the To-Be model, which represents the future The principles are the mission of EA put into (or ideal) state with the time base taken into account. 4) Reference model This model is referenced when generating 1) EA governance architecture models. Its content can be a set of 2) Principles best practices, the results of investigation of the 3) Architecture models current state, or the projection of a future state. PRM As-Is Target To-Be The Japanese government has published the BRM following five reference models. DRM SRM BA BA BA •Performance Architecture (PRM) TRM DA DA DA • Business Reference Model (BRM) 4) Reference AA AA AA • Data Reference Model (DRM) models TA TA TA • Service Reference Model (SRM) 6) Transitional processes •Technology Reference Model (TRM) 5) Standards With the exception of PRM, which is a set of models for assessment indicators, these models Figure 1 Structure of Enterprise Architecture. correspond to individual architecture models. FUJITSU Sci. Tech. J., 42,3,(July 2006) 287 H. Matsuyama: Approach to EA at Fujitsu and Relationships between EA, SDAS, and SOA 5) Standards EA structure cannot be uniformly determined, The standards are technical and institution- attention is particularly focused on establishing al rules and standards that should be referenced the EA building process. in EA activities. Some examples of these stan- dards are the development standards, data 3.2 Fujitsu’s concept for EA building definition standards, security policy, and opera- process tion management standards. The EA building process varies, and it is 6) Transitional processes not clearly defined even in the EA of the Transitional processes are the processes Japanese government. After study, Fujitsu divid- required to make a system operational and are ed the EA building process into five phases based on the current operations and IT system. (Figure 2). The wider the introduction area of a target The EA building process starts after a vision organization becomes, the more difficult the plan- and mission based on the management environ- ning of possible transitional processes becomes. ment have been developed and confirmed. In the In general, the processes targeted for putting the EA building cycle, individual phases are next system into operation are collectively called implemented in sequence to form the cycle of an implementation plan. plan-do-check-act (PDCA). For an EA structure, its specific content and 1) Phase 1: Developing principles points of importance vary depending on the In this phase, principles that constitute rules current state, strategy, mission, and goals of the for promoting an EA are developed and, if neces- target organization. Because the content of an sary, the area to be optimized by the EA is Vision and 1. Development of principles mission • Set principles • Determine areas to be optimized/principles EA framework 1) EA governance 2) Principles 5. EA maintenance and 3) Architecture models 2. Architecture development PRM improvement As-Is Target To-Be BRM • Develop architecture models • Assess EA DRM • Develop reference models SRM BA BA BA • Review EA TRM DA DA DA • Develop standards 4) Reference AA AA AA • Establish EA models TA TA TA 6) Transitional processes 5) Standards 4. Next system construction 3. Transitional processes 4. Next system construction • System4. Next design system construction development • • stemSystem development design • Develop transitional processes • System design • •Test/commissioning System development • Create target artifact • System development • Test/commissioning • Create RFP • Test/commissioning EA governance RFP: Request for proposal Figure 2 EA building process. 288 FUJITSU Sci. Tech. J., 42,3,(July 2006) H. Matsuyama: Approach to EA at Fujitsu and Relationships between EA, SDAS, and SOA determined. Because it is difficult to introduce to the EA from model changes that have been an EA from scratch to an entire organization or made during development can lead to EA mainte- system, the often-adopted approach is to introduce nance and improvement. EA to a smaller area and then extend it according Each phase is composed of several steps, to the results of the introduction. while EA governance controls the processes as a 2) Phase 2: Developing a main architecture whole. EA governance
Recommended publications
  • Surviving the Petabyte Age: a Practitioner's Guide
    • Cognizant 20-20 Insights Surviving the Petabyte Age: A Practitioner’s Guide Executive Summary The amount of time it takes for news to become common knowledge has shrunk, thanks to: The concept of “big data1” is gaining attention across industries and the globe. Among the drivers • An emerging network of social media and blogs are the growth in social media (Twitter, Facebook, that potentially makes everyone a publisher of blogs, etc.) and the explosion of rich content from good and bad news. other information sources (activity logs from the A rapid increase in the number of people who Web, proximity and wireless sources, etc.). The • are untethered from traditional information desire to create actionable insights from ever- receptacles and now have a highly mobile increasing volumes of unstructured and struc- means of collecting and ingesting information. tured data sets is forcing enterprises to rethink their approach to big data, particularly as tradi- • The meteoric rise of desktop tools housing a tional approaches have proved difficult, if even significant portion of information. Organiza- possible, to apply to structured data sets. tions need to understand the information and processes involved in the dispensation of desk- One challenge that many, if not most, enter- top-managed information (mostly Microsoft prises are attempting to address is the increas- Access and Excel). This information is most ing number of data sources made available for likely to be found in the form of: analysis and reporting. Those who have taken an Copies of operational data (including both early adopter stance and integrated non-tabular > sources and targets).
    [Show full text]
  • Annual Report 2016
    4 AUDIT +1.0 % 202.0 CHF million Net revenues 2016 Lukas Marty Head of Audit Transformation as a source of strength This past year the audit business was driven more than usual by transactions, restructuring and relocations. KPMG’s technologically innovative, interdisciplinary services were extremely successful on the market. The faster the transformation, the more important the peace of mind offered by auditors. The more companies change, the greater the potential for auditors to make a vital contribution. And this is something KPMG has been quite successful at over the past year. Digitization raises demand for advisory services On the other hand, technological transformation There are multiple factors at play here. On the has intensified even further. Many clients one hand, Swiss businesses and companies are restructuring their IT systems, often with located in Switzerland have been involved far-reaching consequences: Companies are in numerous deals which need to be assessed being reorganized and their age-old structures by auditors, even if they take place outside radically dismantled. Standardized IT solutions Switzerland. The bustling acquisition schedule now make it possible for tasks previously is partly attributable to the strong franc, which performed across a large number of subsidiaries has boosted the purchasing power of Swiss to be assigned to just a few global shared corporations enormously. Yet the strong franc service centers. Not only that, but standardized has also prompted both foreign and Swiss firms IT solutions also allow global guidelines to be to take a more critical look at which activities established within corporations, industries and they want to keep in high-priced Switzerland and even beyond.
    [Show full text]
  • DLT RIDER to MANUFACTURER END USER TERMS (For Public Sector End Users)
    DLT RIDER TO MANUFACTURER END USER TERMS (For Public Sector End Users) 1. Scope. This DLT Rider to Infor, Inc. (“Manufacturer”) End User Terms (“DLT Rider”) establishes the terms and conditions enabling DLT Solutions, LLC (“DLT”) to provide Manufacturer’s Offerings to Public Sector Government Agencies to include the Federal, State and Local entities (the “Licensee” or “Customer”). 2. Applicability. The terms and conditions in the attached Manufacturer Terms are hereby incorporated by reference to the extent that they are consistent with Public Sector Laws (e.g., the Anti-Deficiency Act, the Contracts Disputes Act, the Prompt Payment Act, the Anti-Assignment statutes). To the extent the terms and conditions in the Manufacturer's Terms or any resulting Customer Order are inconsistent with the following clauses, they shall be deemed deleted and the following shall take precedence: a. Advertisements and Endorsements. Unless specifically authorized by Customer in writing, use of the name or logo of Customer is prohibited. b. Assignment. All clauses regarding Assignment are subject to Assignment of Claims and Novation and Change-of-Name Agreements. All clauses governing Assignment in the Manufacturer Terms are hereby deemed to be deleted. c. Audit. During the term of a Customer order subject to this Rider: (a) If Customer's security requirements included in the Order are met, Manufacturer or its designated agent may audit Customer's facilities and records to verify Customer's compliance with this Agreement. Any such audit will take place only during Customer's normal business hours contingent upon prior written notice and adherence to any security measures the Customer deems appropriate, including any requirements for personnel to be cleared prior to accessing sensitive facilities.
    [Show full text]
  • UNITED STATES DISTRICT COURT SOUTHERN DISTRICT of NEW YORK ------X : : : : in the MATTER of a WARRANT to : SEARCH a CERTAIN EMAIL ACCOUNT : No
    UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x : : : : IN THE MATTER OF A WARRANT TO : SEARCH A CERTAIN EMAIL ACCOUNT : No. 13 Mag. 2814 CONTROLLED AND MAINTAINED BY : MICROSOFT CORPORATION : : : : - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x MEMORANDUM OF LAW OF AMICUS CURIAE INFOR IN SUPPORT OF MICROSOFT CORPORATION’S MOTION TO VACATE THE SEARCH WARRANT GIBSON, DUNN & CRUTCHER LLP Orin Snyder Alexander H. Southwell Jane Kim 200 Park Avenue New York, NY 10166 Telephone: (212) 351-4000 Fax: (212) 351-4035 Thomas G. Hungar (pro hac vice pending) [email protected] 1050 Connecticut Avenue, NW Washington, DC 20036 Telephone: (202) 955-8500 Fax: (202) 467-0539 Attorneys for Amicus Curiae Infor TABLE OF CONTENTS Page INTEREST OF AMICUS CURIAE ................................................................................................. 1 INTRODUCTION .......................................................................................................................... 2 ARGUMENT .................................................................................................................................. 4 I. Infor Joins The Arguments Set Forth In The Amicus Curiae Briefs Of Verizon Communications, Inc., Apple Inc., And Cisco Systems, Inc. ............................................. 4 II. U.S. Technology Companies Will Be Substantially Harmed Should ECPA Warrants Apply Extraterritorially. .....................................................................................
    [Show full text]
  • A Day in the Life of Your Data
    A Day in the Life of Your Data A Father-Daughter Day at the Playground April, 2021 “I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them. Let them know precisely what you’re going to do with their data.” Steve Jobs All Things Digital Conference, 2010 Over the past decade, a large and opaque industry has been amassing increasing amounts of personal data.1,2 A complex ecosystem of websites, apps, social media companies, data brokers, and ad tech firms track users online and offline, harvesting their personal data. This data is pieced together, shared, aggregated, and used in real-time auctions, fueling a $227 billion-a-year industry.1 This occurs every day, as people go about their daily lives, often without their knowledge or permission.3,4 Let’s take a look at what this industry is able to learn about a father and daughter during an otherwise pleasant day at the park. Did you know? Trackers are embedded in Trackers are often embedded Data brokers collect and sell, apps you use every day: the in third-party code that helps license, or otherwise disclose average app has 6 trackers.3 developers build their apps. to third parties the personal The majority of popular Android By including trackers, developers information of particular individ- and iOS apps have embedded also allow third parties to collect uals with whom they do not have trackers.5,6,7 and link data you have shared a direct relationship.3 with them across different apps and with other data that has been collected about you.
    [Show full text]
  • Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High Performance in Government
    The Government Executive Series Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High performance in government What characterizes high performance in government? Through our extensive research and experience in the public sector, Accenture has found that true high-performance govern- ments bear unmistakable hallmarks. High-performance governments generate maximum public value. They are relentlessly citizen centered and outcome focused. Their capabilities and operational activities all support the delivery of outcomes defined by their mission, and they measure their performance based on those outcomes—not just inputs and outputs. At the same time, high-performance governments are committed to cost-effectiveness. They hold themselves accountable; they actively accept their role as stewards of the public trust; and they make their operations and results transparent to all. They are innovative and flexible, continually striving to improve value delivery, and are able to respond creatively to new challenges and opportunities. They work in open and collaborative ways, understanding that their organization is part of a larger system, and cultivate working relationships with other agencies, organizations and stakeholders. Finally, high-performance governments reflect their enthusiasm for delivering public value. This evident passion engages both internal staff and external stakeholders in active support of their organizations’ missions. Shared services enables high performance. It allows governments
    [Show full text]
  • Code Rules: a Playbook for Managing at the Crossroads
    Code Rules A Playbook for Managing at the Crossroads By Malcolm Frank, Paul Roehrig and Ben Pring | FUTURE OF WORKTM © Cognizant Technology Solutions U.S. Corporation 2013, all rights reserved. Preface Today’s high-flying companies — the outliers in revenue growth and value creation — are winning with a new set of rules. They are dominating their sectors by managing the information that surrounds people, organizations, processes and products — what we call Code HalosTM— to build new business and operating models. 1 Code Halos contain a richness of business meaning that forms the new basis of competition. When Code Halos scale, they spark new commercial models in a predictable five-step model that can take entire industries to “the Crossroads,” a compressed period of time in which market dominance can dramatically flip from industry stalwarts to challengers. In this white paper, we define the new rules of success by decoding the business of meaning and the pattern of success that has emerged. 2 FUTURE OF WORK June 2013 CODE RULES: A PLAYBOOK FOR MANAGING AT THE CROSSROADS 3 Executive Summary What separates today’s high-flying outliers — such as Apple, Google, Amazon, Netflix and Pandora — from fast-followers and wannabes? It’s the ability to disrupt markets by capturing customer insight and market meaning from the flood of data swirling around us all. The data — or the Code Halo™ that accom- panies people, organizations and devices — contains a richness of potential business meaning that far outstrips the value of bricks, mortar and other physical assets that have historically powered market leadership.
    [Show full text]
  • INFOR, INC. (Exact Name of Registrant As Specified in Its Charter) DELAWARE 333-183494-06 01-0924667 (State Or Other Jurisdiction (Commission (I.R.S
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report (Date of earliest event reported): April 6, 2020 (March 31, 2020) INFOR, INC. (Exact name of registrant as specified in its charter) DELAWARE 333-183494-06 01-0924667 (State or other jurisdiction (Commission (I.R.S. Employer of incorporation or organization) File Number) Identification Number) 641 AVENUE OF THE AMERICAS NEW YORK, NEW YORK 10011 (Address of principal executive offices) (Zip Code) (646) 336-1700 (Registrant’s telephone number, including area code) Not Applicable (Former name or former address, if changed since last report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligations of the registrant under any of the following provisions: ☐ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ☐ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ☐ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ☐ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Securities registered pursuant to section 12(b) of the act: None Trading Name of exchange Title of each class Symbol on which registered N/A N/A N/A Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter).
    [Show full text]
  • Detecting and Preventing Duplicate Invoice Payments
    White Paper Detecting and preventing duplicate invoice payments Executive summary Duplicate invoice payments occur far more frequently than most organizations realize. On average, approximately 0.1% to 0.05% of invoices paid are typically duplicate payments—which for a medium- size organization with annual costs of $100 million over a three year period, could represent a loss of $300,000. Within the public sector, this amount is far higher due to the typical size and volume of payments as can be seen from the results posted by the US Government Accountability Office (GAO) in their 2012 annual report, which indicates that the GAO helped to reduce “improper payments by about $1.4 billion for 22 federal programs.” 1 Table of Contents 1 Executive summary How control violations are performed 2 What are the main causes of duplication? 4 How to detect duplicate payments 16% Manual processing 4 Basic steps to reduce duplicate payments Data warehouse 20% processing 5 The Infor answer 64% Automated processing Figure 1. 64% of organizations rely on manual processing to detect duplicate invoice payments.2 While many duplicate invoice payments are recognized after high- integrity suppliers notice the mistake, many other duplicate payments require expensive recovery audits and/or intensive manual processes. Many are never identified or resolved. According to a 2012 KPMG poll, “64% of organizations still rely primarily on manual control testing to detect control violations such as duplicate invoice payments.”3 1 US Government Accountability Office, Summary of GAO’s Performance and Accountability Report Fiscal Year 2012; p. 8 2 Based on data published in: KPMG; Low Tech Approach to High Risk Challenges, KPMG Pulse Survey results from the 2012 RSA Archer GRC Summit; June 2012; p.1 3 KPMG, p.
    [Show full text]
  • June 12, 2013 Item No. 9
    June 12, 2013 Item No. 9 AUTHORIZATION TO ENTER INTO TWO (2) YEAR SERVICE AND SUPPORT AGREEMENTS WITH YARDI, INFOR, ORACLE AND SALESFORCE.COM FOR MAINTENANCE AND SUPPORT SERVICES FOR THEIR RESPECTIVE SOFTWARE AND SYSTEMS To the Honorable Board of Commissioners: RECOMMENDATION It is recommended that the Board of Commissioners authorizes the Chief Executive Officer (“CEO”) or his designee to enter into two (2) year agreements: (1) with Yardi in an amount not‐to‐exceed $540,000 for support and maintenance; (2) with Infor in an amount not‐to‐exceed $500,000 for support and maintenance; (3) with Oracle in an amount not‐to‐exceed $480,000 for support and maintenance; and (4) with Salesforce.com in an amount not‐to‐exceed $800,000 for subscription maintenance and support for fiscal years 2013 through 2015. The Executive Vice President (“EVP”) of Finance, the Office of the General Counsel and the Department of Procurement and Contracts have completed all necessary due diligence to support the submission of this initiative and recommend the approval of this item accordingly. CORPORATE GOAL The proposed program supports CHA’s corporate goals of ensuring that the CHA’s housing portfolio is safe, decent and sustainable. FUNDING: CHA General Fund SOLICITATION SUMMARY Vendor: Yardi Systems, Inc. 430 South Fairview Ave. Goletta, CA 93117 Contract Type: Professional Services Contract Amount: $540,000 Contract Period: July 1, 2013 through June 30, 2015 M/W/DBE Participation: 100% MBE Section 3: Hiring Not Applicable XX Vendor: Infor (US), Inc. 13560 Morris Road Alpharetta, GA 30004 Contract Type: Professional Services Contract Amount: $500,000 Contract Period: January 1, 2014 through December 31, 2015 M/W/DBE Participation: Waiver XX Section 3: Hiring Not Applicable XX Vendor: Oracle Corporation 233 S.
    [Show full text]
  • Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience
    September 23, 2019 OFFERING OVERVIEW Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience Holger Mueller Vice President and Principal Analyst Copy Editor: Jim Donahue Layout Editor: Aubrey Coggins Produced exclusively for Constellation Research clients TABLE OF CONTENTS Executive Summary ......................................................................................3 About Oracle HCM ......................................................................................4 Functional Capabilities ..................................................................................9 Pricing ..................................................................................................21 Analysis and Observations .............................................................................22 Recommendations ......................................................................................26 Related Research .......................................................................................28 Endnotes ...............................................................................................30 Analyst Bio .............................................................................................32 About Constellation Research ..........................................................................33 © 2019 Constellation Research, Inc. All rights reserved. EXECUTIVE SUMMARY This report provides an overview of Oracle HCM and analyzes its capabilities to satisfy
    [Show full text]
  • Infor Fourth Shift RELEASE ROADMAP
    Infor Fourth Shift RELEASE ROADMAP APRIL 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 Disclaimer This presentation reflects the direction Infor may take with regard to the products or services described herein, all of which is subject to change without notice. This presentation is not a commitment to you in any way and you should not rely on any content herein in making any decision. Infor is not committing to develop or deliver any specified enhancement, upgrade, product, service or functionality, even if such is described herein. Many factors can affect Infor’s product development plans and the nature, content and timing of future product releases, all of which remain in the sole discretion of Infor. This presentation, in whole or in part, may not be incorporated into any agreement. Infor expressly disclaims any liability with respect to this presentation. INFOR FOURTH SHIFT- Roadmap Release | April 2021 2 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 2020 - Recap Infor Fourth Shift 8.00B Technical Utility Mobility Microsoft 2019 New and improved functions New VisiBar Web Client Support Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Microsoft Support Fourth Shift support for latest Microsoft platform. Benefits: Futureproof on latest versions Microsoft Windows Server 2019 Microsoft SQL Server 2019 Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Fourth Shift 8.00B Manufacturing, Finance, Technical and performance improvements.
    [Show full text]