IT Infrastructure Audit
IT Infrastructure Audit
22
2
ACKNOWLEDGEMENT
Total gratitude goes to the staff and management of NSITF who gave us all the much needed
cooperation and support for the execution of this project.
FORWARD
Automation of the workplace is the current revolution in the world as infectious diseases have
taken over, also the need to generate more revenue and reduce human errors, it becomes
necessary to automate every process in other mitigate these challenges.
22
3
Contents
Overview 4.
Overview of the Nigeria Social Insurance Trust Fund and the 5-year strategic plan for
business development.
Workforce Assessment 6.
Assessing the capacity of the current workforce at the head office with regards to
understanding their level of conformity with ICT standards.
Assessing the current software infrastructure and all of its components existing at the Head
Office with particular interest on efficiency, suitability, scalability, time-saving techniques,
overall service delivery
,
Technology Harmonization 11.
22
4
Support
Designing a support framework needed to support the current workforce at the ICT
department with regards to the infrastructure available.
Recommendations
Add-Ons
Extra offers and services required for continued effective service delivery
Concluding notes
22
5
Overview 1
The Nigeria Social Insurance Trust Fund is an agency under the Federal Ministry of Labor and
Employment with a workforce of about 5000+ saddled with the responsibility of providing
workplace insurance and prompt payment of employees claims in the event of workplace related
accidents and injuries.
22
1
automation that will sustain the core mandate and objectives of the fund progressively over a 5-
year period.
Different studies, research, data gathering and data analysis patterns were employed in the
course of developing and designing the roadmap to reposition the fund and prepare it for the
future ahead.
We were able to gather on the spotlight an understanding from members of staff what they feel
has been going technologically and what they feel should be done to improve the current status
of technology within the fund.
And also information concerning other aspects of technology, technology usage, user
experience, technical and non-technical reviews were gathered from across all the departments
of the fund with different data gathering schemes.
In one of the surveys, members of staff across the fund were asked to rate the IT services at
NSITF on a scale of 1 to 10 in other to ascertain generally how much they feel technology has
penetrated the fund, and they provided interesting feedbacks which were well captured
pictorially and in tabular forms below.
22
2
Question: On a scale of 1 – 10, how will you rate the IT services of NSITF?
Enforcement
APRD
Claims
Servicom
Maintenance
Human Resources
Corp. Affairs
Procurement
Investment
Audit
Finance
0 1 2 3 4 5 6 7 8 9
Fig. 1.0
On a tabular form;
Scores F/A Audit Inv. Proc. C.A. H.R. Maint. Serv. Claims APRD ENF
(a) 8 5 1 5 4 6 6 5 6 5 5
(b) 8 2 2 8 5 6 6.5 4 2 5 1
(c) 7
Avg. 8 3.5 1.5 6.5 4.5 6. 6.5 4.5 3 5 3
Table 1.0
Another survey was geared towards ascertaining user satisfaction and sense of fulfillment while
using the IT services available at NSITF.
These surveys are going to give us an insight into what the staff of NSITF already feel or
understand about the technology workspace.
22
3
It launches us into the event of making a thorough evaluation of existing infrastructure and all of
its components.
User Review
APRD
Enforcement
Claims
Servicom
Maintenance
Human Resources
Corp. Affairs
Procurement
Investment
Audit
Finance/Accounts
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Fig 1.1
On a tabular form;
Scores F/A Audit Inv. Proc. C.A. H.R. Maint. Serv. Claims APRD ENF
(a) G. G. V.B. V.G. B. G. G. G. G. G. G.
(b) V.G G. V.B. G. B. G. G. B. B. G.
(c) G.
Table 1.1
Legends used:
22
4
Materials used for data collection in the whole entire exercise includes:
• Questionnaires
• Paper Tests
• Equipment tests
• Interviews
• Meetings
The data extracted were processed, modelled, analyzed and results published.
22
5
NETWORK
INFRASTRUCTURE
22
6
Network Infrastructure 2
2.1 Overview
The network infrastructure model at NSITF is quite dynamic and a mix of different
implementations characteristic of a modern network infrastructure system. There is a pure
network infrastructure implementation taking care of the entire internetwork, it's components
such as segments, connecting nodes, distribution systems, firewalls etc and an active directory
implementation that takes care of users on a network, their departments, their units, their
authentication, access to network resources, then properly controls and audits their activities.
This is also classified as a client-server model where clients are the individual connecting nodes
or systems connected to a central server that provides resources to them and totally takes care
of the administration, management and running of the entire client-server implementation.
22
7
The clients access resources from the server after proper authentication and authorization, the
server identifies the client and registers them on the network, then henceforth puts them in a
managed situation. In trying to properly understand the entire network infrastructure, we will
have to look at the network diagram below:
22
8
The diagram above comprises of two broad segments which is the main building and the annex,
they are both linked from a central connection point that distributes over the both of them. The
annex is connected to the central point through fiber optics, external links such as the
GalaxyBackbone internet bandwidth and cloud storage support brought about additional
connectivity to the existing infrastructure.
The main block or main building and annex has its nodes or systems connected to the central
connection point through different connection means or modes such as wired and wireless
systems.
The wireless system distributes connectivity to wireless clients mostly through wireless access
points such as the UbiquitiTM range of wireless devices.
This connection setup is very efficient as the access points are wireless 802.11n compliant which
can give connection speeds of up to 450Mbps over a range of 150 feet depending on how free
the broadcast area and line of sight is in terms of physical obstructions.
22
9
The wired connection setup is built with direct links connected with CAT6e Ethernet cables
delivering fast Gigabit Ethernet which supports speeds of up to 1000Mbps or 1Gbps. This
network is directly connected to the central station via distribution systems such as CISCOTM
switches and routers and neatly broken up into subnets of class B IP addresses which indicates
also the category and size of operations NSITF is currently running or plans to run in feature.
This connection mode is marred with some issues where certain ports within the departments have
become blind spots which results in packet losses, parity check problems, latency and redundancy
impairing the overall network performance. Lack of routine maintenance is the culprit here.
Maintenance of this infrastructure hasn’t taken place in the past 9 years. Last maintenance was in 2013
so it is safe to say that network connecting ports in the departments are going blind as a result of packet
losses, increased latency, reduced or suppressed throughput etc
The assessment of the central control room took place on the 23rd of February 2022, and
anchored by a brilliant network engineer from the ICT department who took us on a tour of the
facilities, equipment, technologies that is available at the central control room, and exposed us
greatly on its strengths, drawbacks, challenges and vicissitudes that has redefined the course of
the entire operation.
22
10
On first observance or impression, the central control room is neatly arranged and ordered,
server workstations, routers, switches, connecting cables, the racks, distributors, virtualization
equipment, firewall systems etc.
From this room, the administration and running of the entire technology workspace of NSITF is
done. The diagram below gives a glimpse of what the central control room looks like.
22
11
D. SWITCH
ISP
CYBEROAM
FIREWALL D. SWITCH
( D. SWITCH
The Internet Service Provider link goes into the Cyberoam firewall module which serves as a
firewall and filter then forwards the traffic to a distribution switch which in turn breaks the link
down into two more distribution switches. This goes on to feed the rest of the network.
The CISCO ISE (Identity Services Engine) is meant to provide network level authentication and restrict
unauthorized users from accessing any network resource but unfortunately the ISE is down and not
operational at this moment and it’s supposed replacement, the SOPHOS module is yet to take off.
The control center is suffering from inadequacy or inadequate equipment such as the expected SOPHOS
meant to provide a much better network level authorization and authentication. This has exposed the
entire network to a certain degree of vulnerability where users can plug in their systems when in
possession of a network cable to do so and from this end an experienced attacker can cause a certain
degree of unwholesome acts for which a basic denial of service attack can happen from within thereby
aggravating the overall performance of the entire network already marred with blind connecting ports
22
12
DATA
UPS 2 CENTER
32
BATTERY
32 UPS 3
BATTERY
UPS 1 60 32
BATTERY BATTERY
22
13
Inverter 1 and 2 feeds UPS 3 which in turn feeds the data center. The changeover switch helps
to change between inverter 1 and 2 weekly or monthly because it can’t be working at the same
time.
Installation was done in 2014, three 40KVA inverters, out of which two is for failover/backup of
the datacenter and the other one is for the building.
The two has been down since 2016. Only one power system, a 20KVA UPS is now supporting the
datacenter with no backup.
There is cooling system provided at the datacenter but it is not adequate. It is required that an industrial
cooling system be used to replace the home-based air conditioner at the datacenter.
22
14
Different measurement yardsticks were used in running the tests and collating the data in
other to make sure that the tests were adequately done.
2.31 Latency
Network latency, sometimes called lag, is the term used to describe delays in communication
over a network. Latency meaning in networking is best thought of as the amount of time it takes
for a packet of data to be captured, transmitted, processed through multiple devices, then
received at its destination and decoded.
These tests took a considerable number of days to achieve with latency been measured in every
way from main building to annex using computer systems running real-time network operations
within different departments.
22
15
Several network data packets and traffic were analyzed and this trend was established.
For latency not to be an issue, it is advised that the network connection ports within each
individual department be thoroughly serviced and other pending issues with the electronic
workspace be resolved in other to smoothen the process of network transactions etc.
22
16
annex intranet exhibited traits of a network bugged with network delays from the results of system
interconnectivity tests within the annex alone
This is a metric or yardstick for measuring network performance as a high optimal network will
have little or no packet losses comparatively. It will help us analyze the speed and performance
of our network at NSITF.
This factor was measured by observing deliberately forwarded network traffic from one node or
system to the other and observe the status of all the packets that were transmitted in other to
establish if they all delivered or had some or all of its packets lost. The two systems being
members of the network.
From the image below you’ll notice that after reviewing the data of a group of packets, the above
result was established, main building had more of packet losses than the annex which may be
attributable to the fact that some of the connection ports in each individual department have
already started failing. This also means main block is threatened with reduced network
performance.
22
17
22
18
In order to strategically obtain answers concerning the true performance of the local network
infrastructure, users were asked questions regarding their sign in experience whenever they
come to work since there is a central authentication system provided by the active directory
platform of the Windows server in use.
Respondents from the main block gave the sign in experience a much lower score compared to
that of the annex which gave somewhat of a balanced assessment.
Note some systems especially some of them at annex are not connected to the local area network
infrastructure and the active directory responsible for authenticating users centrally.
22
19
The image below tends to describe how users reacted when asked about their entire network
experience, this very question as quoted earlier will contain answers informed by the internet
experience since network is may also mean the internet as well.
From the foregoing we can observe that users were equally distributed in answering the
questions, 5 respondents answered for the annex while 4 answered for the main block. They
relayed their overall network experience as it affects them and their work. The respondents were
randomly picked in the two blocks from different departments.
22
20
System administration provides the tech workspace, the core and the base of every
business-minded organization where business units synergize, pull resources and work
together for the overall good of their organization.
Primary Domain
OUs Controller
MAIN
ANNEX
22
21
System administration exposes us to another type of network infrastructure built on top of the
already existing one.
Figure 2.8 describes the active directory network topology of the NSITF where the AD (active
directory) was well-configured yielding the classification or grouping of departments as OUs
(Organization Units), and prompt grouping of users into different OUs.
From investigations, it was affirmed that networks users indeed log in from anywhere and log
into the central windows server database, though there are minor situations where a system
does not have access or means of logging onto the network via active directory as seen in some
instances in annex. These areas are deemed not to have active directory coverage as seen in
the topology diagram.
Unfettered use of secondary storage devices such as flash drives which undoubtedly has contributed to
the malware/virus pandemic ravaging the entire electronic workspace.
Group policies unseen or not configured as proper configuration would help in preventing flash drive
usage and encourage the creation and usage of department-based network directories or folders which
will greatly facilitate intra-departmental and inter-departmental file sharing and exchange
22
22
NSITF has a combination of different categories of electronic/digital devices used for the
day-to-day activities of members of staff. These devices include all but:
• Laptops • Scanners
• Desktops • Photocopiers
• Printers
22
1
There is a fair usage of Lenovo manufactured Windows-based desktop and laptop systems. And
these systems also come with some fairly good architecture, running Intel core i5/i3 processors
mostly and an average of 4GB RAM which is fair for a business environment ran by NSITF where
there is just about a lot of text-based paperwork operations, less graphic-intensive operations.
Most of these systems are old, obsolete legacy devices which were purchased 9 – 10 years ago hence
their unsuitability for continued usage for which much of the times complaints about system freezing
abound due to the fact that these systems microchips or chipsets has had its run and is supposed to be
retired.
MACBOOK usage was witnessed in some places within the offices, this is discouraged as MACs are
unsuitable for a business environment dominated by Windows-based machines and there is a certain
learning curve that exists for MACs compared to Windows based systems with regards to ease of use,
navigation and user experience.
There is little or totally absent routine and scheduled preventive maintenance program for these
systems in about 6 years running as previous service level agreements that took care of this has either
been terminated or expired. This has created room for gross inefficiency and poor productivity on the
art of the systems as many of them have continued to malfunction and perform far below expectation.
Service support provided by the in-house IT support team is also inadequate as a result of lack of
enough manpower to take on the challenges support scenarios present. There has to be in place a
formidable support team when maintenance has been put in place in other to maximize the potentials
and results of the business environment.
At NSITF, much of the printers, scanners and copiers are all in one devices or equipment.
Meaning that they all have one manufacturer, a particular set of service / maintenance
technicians. This is good as it greatly aids support, maintenance and general usage.
The products are mostly made of Xerox, the American manufacturer of very high quality, high-
end printing and imaging devices with great quality speed. Few others in certain situations where
some departments buy just printers alone are made by Hewlett Packard, another big American
22
2
manufacturer of similar devices. Below is a snapshot of what printers, scanners and copiers look
like in NSITF.
Fig
2.10
Snapshot of scanners, copiers and printers
Most of the time there is unavailability of consumables like printer or copier ink, papers and things. This
has also impacted on the progress and productivity of employees of the fund.
Just like in the case of laptops and desktops, there is also no routine maintenance program or support
for these systems as previous service level agreements that took care of this has either been terminated
or expired.
MDA Registration
22
3
The minimum RAM (Random Access Memory) of desktops and laptops is 4GB (Gigabytes) which
is ok since there aren’t serious
graphics intensive operations at
the moment but with time this will
change as new application
software and automation that will
require a great deal of processing
power and memory will be
needed.
22
4
As seen in the graph of figure 2.12, we all can witness a common trend where page file increases
with increase in RAM usage.
Page files are virtual memory set within the system to help or assist the work of the RAM (Random
Access Memory).
Investigations made revealed a pattern where a certain number of systems were seen to have
network connection while others aren’t. Network here refers to either connected to the Internet or
local area network, where part of the systems connected to a network may be connected to the
internet only and not the local area network as seen in some situations at the annex.
16
14
12
10
8
6
4
2
0
Connected Disconnected
22
5
As seen in the chart above, cumulatively results from both main block and annex were collated under
this chart. The results were arrived at after checking network connectivity of the systems and
observing that they were disconnected.
User reviews on devices and equipment were collected at the headquarters complex. This gave
an insight on how users feel about the devices they use in the discharge of their day-to-day
activities and duties.
Freez
es,
Connected 96%
Not Connected Freezes Doesn't
Fig 2.14 and 2.15 Printer connection and system freezing user reviews
From the above figure 2.14 and 2.15, it could be observed that users perceived as seen in figure
2.14 with
regards to the ‘not connected’ category with 75 percent that their printers are not connected to
the network but only accessible or usable when they go directly to it to print from the system it
is directly connected to.
22
6
This also points to the fact that network configuration with regards to active directory is yet to
address the necessary work-related issues.
It is recommended that all printers be linked to the active directory inventory for proper administration
and ease of use so that staff will easily print from anywhere instead of copying documents with flash
drives to approach a printer and print directly.
In the figure 2.15 where reviews were made on system freezing, 96 percent respondents stated
that their systems freeze. This is also an indicator that these devices need to be either replaced
in situations where that necessitate replacement, better support and maintenance adequately
provided in situations where support and maintenance is the problem.
Survey was also conducted round the fund to ascertain user perception on the efficiency of
systems, devices and equipment they use daily in executing their day-to-day tasks and activities.
22
7
APRD
Enforcement
Claims
Servicom Inefficient
Slightly Eff.
G. Admin
Efficient
Corp. Affairs
Very Efficient
Procurement Average
Investment
Audit
Finance/Accounts
From the data above, we can clearly understand how the survey was carried out and the nature
of data that was collected.
5 key probable answers with regards to equipment efficiency were presented to the user for
which they are meant to answer 1, these are:
The above result is further represented collectively in the pie chart below
22
8
Very Efficient
9% Inefficient
18%
In the above image, it will be seen that most respondents went for “slightly efficient” which is
followed by the respondents that went for “efficient” before that of “inefficient” at 18%.
Respondents who stated that the devices and equipment are very efficient constitute the least
percentage of 9 percent.
Survey was also conducted round the fund to ascertain user perception on speed of completing
processes electronically for a single task at least, this criterion becomes instructive since it tends
to measure equipment efficiency in another way where it is understood that most software such
as office suite used by the staff are non-browser based applications and not utilizing network
resources, so efficiency totally lie on the machine.
22
9
APRD
Enforcement
Claims
Servicom
Takes All Day
G. Admin
Timely
Corp. Affairs
Slow but completes
Procurement
Investment
Audit
Finance/Accounts
From the data above, we can clearly understand how the survey was carried out and the nature
of data that was collected.
3 key probable answers with regards to equipment efficiency were presented to the user for
which they are meant to answer 1, these are:
• Takes all day for cases where completion a task takes all day
• Timely for cases for cases where completion of a task completes within record time
• Slow but completes for cases where completion of a task is slow but completes eventually
The above result is further represented collectively in the pie chart below
22
10
All Day
5%
Timely
28%
Slow but
complete
s
67%
In the above image, it will be seen that most respondents with 67 percent score went for “slow
but completes” which is followed by the respondents that went for “Timely” at 28 percent before
that of “All Day” at 5 percent.
Network vulnerability threat exist to a certain degree because the Cisco Identity Services Engine
(ISE) that was used to authenticate network users is currently out of operation and meant to be
replaced be a SOPHOS Module which is yet to happen and also the unfettered arbitrary usage of
flash drives can pull a network segment down. In situations where flash drives may run unverified
software which may end up been very harmful to the entire network.
22
11
22
12
WORKFORCE ASSESSMENT
Workforce Assessment 3
Assessment of workforce is a key activity or event in the process of drafting a 5-year strategic
plan for IT roadmap and sustainability plan for business development. You will need to know how
22
13
You wouldn’t ignore a set of employees or staff that do not understand how to properly and
basically utilize some technology in discharging their day to day activities as the world is gradually
hearken on to the call of total automation.
The emergence of covid-19 and infectious diseases has made it difficult and almost impossible
to continue with the manual way of doing things or using manual processes and as a result
assessment of staff of any organization in terms of compliance with basic IT skills is extremely
important. A roadmap will be useless if the people who will put it into practice are bereft of the
knowledge to do so.
With the foregoing, an IT compliance test was designed to at least test staff and employees of
NSITF on basic IT knowledge which will ascertain how technologically fit they are for the role they
have been playing.
The test, which is a very basic computer appreciation test is not sufficient enough but a good
beginning, can be classified as level 1 and was designed to test staff on the very basic things, it is
only when it is certified that they have gone above this level will it be necessary that a level 2
test takes place.
The test took place on different days for different departments as there was no proper official
communication to all the departments about the test and for them to get ready for it, this also
led to supervision problems as some departments didn’t give enough room for supervision which
of course they weren’t properly intimated official about the test and its modus operandi.
Cumulative results of staff of departments in the basic ICT compliance test administered.
22
14
APRD 66
Claims 67.6
Risk 76
Enforcement 67.6
GA/Training 90
HSE 94
Investment 83.2
Audit 96
Legal 91.2
Finance/Accounts 92
Admin 93.2
Procurement 90
0 20 40 60 80 100 120
Moderate Supervision Low Supervision
Fig 3.0 Cumulative results of staff of departments in the ICT compliance test
In the above chart, we can see the sharp differences between two broad categories, the set of
departments with low supervision and the set of departments with moderate supervision. In
interpreting this chart, we can easily understand why the departments with low supervision
had very high scores.
22
15
Supervision was low. In the departments with moderate supervision, the results were more
reflective of the reality surrounding the true nature of their IT knowledge.
So for better results it’s recommended this test or it’s like is repeated now with good supervision,
this will give us the true nature of the depth of basic IT knowledge of the workforce. Below is
another chart now showing how the departments contributed human resources to the
compliance test.
Participants
Proc
APRD
5%
11% Admin
7%
F/A
Claims 6%
12%
Legal
7%
Risk
1%
Audit
7%
Enf
12%
Inv
7%
GA/TR
HSE
6%
Corp Aff HR 6%
6% 7%
Fig 3.1 Departments staff contribution for the ICT compliance test
22
16
22
17
22
18
The above training set is standard. Increasing the duration will be of much help.
22
19
SOFTWARE
INFRASTRUCTURE
ASSESSMENT
22
20
Software infrastructure assessment tends to understand the true nature and position of any
type of software within the NSITF most especially the type of software typically known and
called application software which is what end users utilize in a typical business environment.
Cloud-based Proprietary
applications software on-premise
Applications
22
21
The figure above clearly shows an outline or an outlay of the software composition at NSITF. A
software infrastructure map detailing how software is constituted. Application software usage
and utilization is very important and vital for a business-minded entity such as the NSITF.
Technology and automation is what drives businesses in this 21st century.
Without automation a lot of things will either be stale or undone, this means that software and
automation is an industry or an area to be taken seriously and not to be joked with, most
especially this period ravaged by the scourge of infectious diseases.
We will have to analyze the different compositions of application software at the NSITF with
the software map provided above and a subsequent table provided below.
There are two broad categories of software at NSITF, in-house application software and 3rd
party vendor-provided application software.
These two broad categories define the environment any application software found at NSITF
belongs to.
App P. L. FW D. A D. F. F. D.S.
E-ECSA Cold fusion Cold fusion Agile Browser Cloud
HRMS Python Django Agile Browser/mobile Cloud
22
22
DOCUSCAN MAIL-
SPMS ENABLE
E-ECSA OFFICE
HRMS SUITE
22
23
From Figure 4.2, it is clearly seen how the present set of software at NSITF is shared amongst
different categories divided along the lines of 3rd party vendor-sourced proprietary systems to
in-house custom-made applications.
In-house application software is defined as that software designed, developed and engineered
by the in-house design and development team at NSITF. They also belong to the category of
‘custom-made’ software since they were customized or tailored to specifications primarily for
the organization they support and work for.
DOCUSCAN
SPMS
DOCUSCAN
E-ECSA SPMS
Pytho
n
Django
Browser
based
HRMS Agile
Design E-ECSA
Cold
MOBILE Fusio
n
22
24
And the in-house application software at NSITF can further be classified as ‘Enterprise Resource
Planning (ERP) Software’ or ‘internally facing software’ since they were designed for the
organization’s internal usage.
The in-house applications found at NSITF are also further sub-divided into two more groups,
cloud-based software and on-premise software.
1. Performance is measured by efficiency, scalability and other time metrics like average load time and
latency.
2. Efficiency is measured by the quality of output with regards to input.
3. Overall service delivery is measured by suitability, feature set, deployment scope and performance
This is the range of application software that is domiciled, hosted and resident in the cloud. The
cloud here is the storage system in the internet. Storage systems domiciled in the internet are
typically called the cloud. This is also where the term cloud computing came from.
software
Internet
connection
Cloud Storage
End user
with a laptop
22
25
The access to the cloud-based software happens when an end user with a computer or laptop
uses the internet to hook up to the cloud storage with a request to access the software or
application on the cloud storage for which with appropriate authorization an access is made.
There are basically two cloud-based in-house application software at NSITF namely:
• e-ECSA
• HRMS
(a) e-ECSA
The platform ‘e-ECSA’ stands for Electronic Employee Compensation System Application. It is
designed for a variety of uses including making payment of employees claims, registration of
clients/employers and other related information.
Much is not known about the total functionality and feature set of this platform but it is
established that it is an ERP on the cloud or an internally-facing software used primarily by the
staff of NSITF and is currently and actively used for registration of clients.
From the little assessment and observations made with an admin-navigated demonstration, it is
efficient and scalable within the minimal usage scope it was subjected to, the software was built
to cater for the bulk of the fund and was just recently launched in January 2022 but at the
meantime only 4 branches are utilizing it.
22
26
Software Metadata
Design Architecture
Architecture Data
Language Cold Fusion
Framework Cold Fusion
Design Approach Agile
Design Form Factor Browser-based
Deployment Information
Information
Deployment Scheme Cloud
Current Environment Production (In Use)
Coverage Area Fund Wide
22
27
Efficiency
Score 76%
Output responded to input within record time
and delivered results
Suitability
Score 38%
This software is still evolving, is yet to attain
sufficient suitability for its core objectives
Feature Set
Score 27%
Software is still evolving and is yet to have
enough features suitable for it’s category
Scalability
22
28
Performance
Score 69
Standard performance metrics are efficiency,
scalability and time differentials
Observations
• This platform is still new, just launched and working with a minimal number of about 4
branches.
• Developer/development team is experienced within the scope and scale of what they’ve
been able to produce.
• Much utilization and usage hasn’t happened.
22
29
Recommendations
• This platform has a one-man development team, it is recommended for the sake of
prompt and timely delivery and also for the sake of rich, enhanced and quality feature set
that the development team includes more developers.
• This platform is designed currently with cold fusion technology, the platform intends to
expand across the entire fund, support real-time processes and deal with traffic that will
ensue when it’s coverage and usage area or scope is enlarged, it is recommended that
cold fusion be reviewed as it is not the technology that immediately comes to mind when
running and scaling enterprise systems.
(b) HRMS
The platform ‘HRMS stands for Human Resources Management System. It is designed chiefly and
solely for the Human Resources department to manage employees, take care of their needs and
create a communication channel between them and their employees for proper engagement.
This software is still in development environment. Has two decent modules at this stage namely
• leave application
• nominal roll
The development team has done a lot of engagement with the user department Human
Resources in data gathering, needs assessment and in trying to fill the void created by lack of
automation in this area.
22
30
This software comes in two flavors, a web-based/browser based application and an android
application.
Software Metadata
Design Architecture
Architecture Data
Language Python and Java
Framework Django
Design Approach Agile
Design Form Factor Browser-based and Android Native
Deployment Information
Information
Deployment Scheme Cloud
Current Environment Development (Not In Use)
Coverage Area Not available
22
31
Efficiency
Score 89%
Output responded to input within record time
and delivered results
Suitability
Score 64%
This software is quite suitable for what it is
intended for with its scope and objectives
Feature Set
Score 27%
Software is still evolving and it’s features yet
to attain the level of a standard HRMS
22
32
Scalability
Performance
Score 87
Standard performance metrics are efficiency,
scalability and time differentials
22
33
Observations
• The platform has two form factors, a web-based or browser-based application and an
android native application.
• Both the android and browser-based versions are hosted on cloud and has shown
recognizable performance.
• This platform is still in development; accurate performance information is not available
for it.
• Developer/development team is experienced within the scope and scale of what they’ve
been able to produce.
/
Recommendations
• This platform has a one-man development team, it is recommended for the sake of
prompt and timely delivery and also for the sake of rich, enhanced and quality feature set
that the development team includes more developers.
• This modest project has been started by the development team and they have invested
some effort in needs assessment and data gathering, it is recommended that the they be
given all the necessary support to see to the end of this project as it is currently suffering
from unavailability of required resources such as computers and other logistics support.
•
22
34
This is the range of application software that is domiciled, hosted and resident at the NSITF local
datacenter on the premises. This means that the software is directly sitting on servers close to
the in-house users. And they have a very direct access towards it.
software
Local area
network
Local server
End user
with a laptop
The access to the on-premise software happens when an end user with a computer or laptop
uses the local area network connection which maybe wireless or wired means to connect to the
local datacenters with a request to access the software or application for which with appropriate
authorization an access is made.
22
35
There are basically two on-premise in-house application software at NSITF namely:
• DOCUSCAN
• SPMS
(a) DOCUSCAN
The platform ‘DOCUSCAN’ simply imply document scan and it’s an electronic document manager
or document management software. It is designed simply for the purposes of turning physical
document versions to electronic copies for proper management and archiving.
This project has some good features, attained a certain level of suitability with regards to the
purpose of its design, has gone into production and in use but can get better and also improve
far above its current feature set. It is only currently used by the ICT department and there isn’t
much utilization of it.
From the little assessment and observations made with an admin-navigated demonstration, it is
efficient and scalable within the minimal usage scope it was subjected to, the software was built
to cater for the bulk of the fund but it is yet to attain a sizeable coverage area of the fund.
Software Metadata
Design Architecture
Architecture Data
Language Python
Framework Django from Python
Design Approach Agile
Design Form Factor Browser-based
22
36
Deployment Information
Information
Deployment Scheme On-premise
Current Environment Production (In Use)
Coverage Area One department (ICT)
Efficiency
Score 76%
Output responded to input within record time
and delivered results
22
37
Suitability
Score 60%
This software is quite suitable because the
goals are clear and straight to the point
Feature Set
Score 45%
Software yet to attain its full potential and
has some features but yet to be feature-rich
Scalability
Performance
Score 88%
Standard performance metrics are efficiency,
scalability and time differentials
22
38
The vulnerability status is low as a result of the fact that most of the software applications don't
have public access or are not publicly utilized and also due to the fact that the coverage areas of
most of the in-house applications are low, and also due to the fact that a great deal of them are
still under development plus the fact that good security mechanism have been put in place such
as saving the hash value of user account information on the database.
Observations
• This platform has attained a good level of suitability with regards to the original intents,
purposes and objectives.
• The current features are good but not enough yet and needs improvement.
• Developer/development team is experienced within the scope and scale of what they’ve
been able to produce.
22
39
Recommendations
• It is recommended that the features and functionality of this project be scaled up and be
put to use for most of the fund. The coverage area has to expand more than what it
currently is.
• This platform was built with a one-man development team, it is recommended for the
purposes of scaling up and planned improvements that the development team includes
more developers because as it is the features aren’t sufficient yet.
(b) SPMS
The platform ‘SPMS stands for Staff Performance Monitoring System. It is designed chiefly and
solely for the Human Resources department to manage employees/staff performance, with
performance measuring metrics and others.
This software is still in concept stage. Development is yet to start and no data to make any
assessment.
Software Metadata
Design Architecture
Architecture Data
Language N/A
Framework N/A
Design Approach N/A
Design Form Factor N/A
22
40
Deployment Information
Information
Deployment Scheme N/A
Current Environment N/A
Coverage Area N/A
Observations
22
41
/
Recommendations
• For all intents and purposes, it is advised that this software be fused into the existing
HRMS. No need of it standing alone since it is going to be of the same architecture with
HRMS.
Third party vendor software or applications are a variety of application software sourced
externally from an external vendor or provider. Two of the third-party vendor software existing
at NSITF are proprietary software and are listed below:
• MailEnable (Cloud-based)
• Microsoft Office Suite (On-premise)
This is a category of software applications where the licensing is of commercial basis and can
also be called commercial-ware. Here, the providers are not targeting anybody in particular but
anyone interested in using their products. No custom designs for anyone in particular and
updates and maintenance are regularly done.
Cloud based and on-premise proprietary software can be accessed the normal way like in figure
4.1 and 4.2
22
42
(a) mailEnable
The proprietary software ‘mailEnable’ is an e-mailing application software built for users and
very large organizations who can buy the license off the shelf.
It is quite a wonderful email application that rivals its contemporaries like the Microsoft
Exchange Server in the Windows emailing applications domain. mailEnable has lived up to
expectations and has done well in improvements, customer satisfaction, scaling techniques etc
over the years.
As it currently is, mailEnable is been provided to NSITF by another 3 rd party provider who hosts
the mailEnable software on behalf of the fund, not much information was collected for this
event.
Software Metadata
Design Architecture
Architecture Data
Language Unknown (possibly .NET)
Framework Unknown (possibly .NET)
Design Approach Unknown
Design Form Factor Browser-based
Deployment Information
Information
Deployment Scheme Cloud-based
Current Environment Production (In Use)
Coverage Area Fund Wide
22
43
Efficiency
Score 87%
Output responded to input within record time
and delivered results
Suitability
Score 93%
This software is very suitable for the all needs
and purposes it was meant for.
Feature Set
Score 45%
22
44
Scalability
Score 94
This software was built to scale and it does
scale very well.
Performance
Score 89%
Standard performance metrics are efficiency,
scalability and time differentials
22
45
Observations
• Reportedly, some members of staff aren’t using this mail system yet or have boycotted
its usage.
• There are complaints by members of staff over this software but the complaints cannot
be substantiated.
• Software is proprietary and licensed
Recommendations
• It is recommended that members of staff get retraining on using this software and re-
sensitized on the importance of using organization’s email system for official purposes.
22
46
In this section we analyze collectively all the performance test results and information we
gathered on all the in-house application software previously discussed.
Here we analyze the different environments all the in-house software applications at NSITF
belong to. Environments can either be Production, Development or Concept.
Environment
In Concept
Stage
25%
In
Productio
n
50%
In
Developm
ent
25%
Production Environment
These are software applications that has gone live and actively in use, not in any of the testing
phases and neither in development mode/stage.
22
47
Staging Environment
These are software applications that has passed the development stage and is in a test
environment getting prepared to move to production stage when the test checks out.
Development Environment
These are software applications that is still in design or development mode/stage, not in any of
the testing phases, or pre-release.
In Concept Stage
These are software applications that is in idea stage, not in development, staging or production,
but still having the whole entire idea being worked on.
22
48
Coverage area is defined here as how much terrain or departments of NSITF each application has
covered or penetrated. It tries to show the depth of penetration each application has had
considering all the departments of NSITF.
60
50
40
30
20
10
0
BS LE ICT FA IN EN A U CL GA AP RK HSE PR CA
So the chart above clearly shows how much coverage area each software has considering the
size of NSITF.
22
1
4.3.3 Suitability
The suitability analysis graph tends to show how suitable each application software is with
regards to the original intent, or what was conceptualized or envisaged.
100
90
80
70 64
60
60
50 40
40
30
20
10 2
0
DOCUSCAN HRMS e-ECSA SPMS
From the above we can see the different levels of suitability which directly indicates how
suitable the software is with regards to its proposed objectives, ideas and problem solving
directly compared with what they should have been.
4.3.4 Performance
Performance as earlier stated is measured by efficiency, scalability and other time metrics like
average load time and latency. These are the dimensions that critically evaluate the performance
of an application software which is very important in conducting an important survey.
22
2
Below are performance graphs and charts in other to understand the overall performance of the
in-house applications at NSITF.
Page load is measured in seconds, it tends to check the average time an application loads it’s
user interface for a user to engage in using it. On the chart below, page load is on the y-axis while
latency is on the x-axis.
4.3.4.2 Latency
Same thing happens when loading a software or a web application which transmits data over the
network.
Performance Graph
On the performance graph, the application
100
software that has the lowest score is ‘SPMS’
80
because there is no data from it as a result of
60 the fact that it is yet to get into development.
40
20
Fig 4.10 Performance graph
0
DOCUSCAN HRMS e-ECSA SPMS
22
3
NSITF utilizes to a certain degree cloud services which is used to host their internet based
applications and software. Only when such application becomes resident on the cloud or the
internet could anyone access it remotely from anywhere. The diagram below illustrates this
transaction.
22
4
The problem of the cloud services provider is not a new one but a known issue. The service has
become epileptic and the best thing to do is to find another government-licensed cloud provider.
When a cloud provider services become epileptic and ineffective, the following problems
become inevitable:
Users will find it difficult navigating through pages, utilizing page functionalities, stylesheets and
scripts that load through the network that makes usage more pleasant and convenient.
Application will normally malfunction on the user end since network resources aren’t adequately
functioning. Same happens with application inefficiency.
On the overall, service delivery will be poor and the said application will be seen not to have
lived to expectations or deemed to have failed.
22
5
Members of staff across different departments were asked to provide reviews with regards to how
their day-to-day activities have been automated and the answers below were their responses.
APRD
Enforcement
Claims
Servicom
G. Admin Not Automated
Corp. Affairs Automated
Procurement
Investment
Audit
Finance/Acco…
Fig 4.11 User reviews on how automated their daily tasks are
Fig 4.12 User reviews on how automated their daily tasks are
22
6
From the above, we can deduce that most people asserted that their daily tasks are very much
not automated. This means that staff members don’t think technology has done anything to
help their daily tasks and as it is, something must be done.
22
7
Recommendations
1
The in-house development team should be given all the needed support to complete the
projects they’ve embarked on most especially the HRMS. They have produced some level of
automation in some of these projects they are currently working on, with the right tools and
support they will be able to do more.
It is hereby recommended that for most of the software projects embarked upon by the in-
house development team be built with a uniform, scalable, efficient technology and
framework.
The fact that some applications were built with Python technology and another was built with
Cold fusion doesn’t help the concept of team-enhanced project/application/code management
and administration.
When applications are built with different technologies by different people within the same
workspace, proper vetting, scrutiny, harmonization becomes a problem because at that
moment they are not working as a team but as individuals.
22
8
TECHNOLOGY HARMONIZATION
22
9
The technologies at NSITF needs a sort of reconciliation which involves harmonization, removal
or re-organizing. This stems from the fact that there are technologies currently at NSITF that in
ideal cases don’t need to stand or survive alone but needed to be fused into another one for the
purposes of proper management, easy program updates and patches.
Then on the other hand, identify technologies that aren’t needed anymore that needs removal
or expunging.
This section will initiate this process. We will need to enumerate technologies that needs
harmonization and later the ones that will need to be expunged then later develop means for
the harmonization of existing technologies/software infrastructure where harmonization is
necessary and expunging of certain technologies/software infrastructure where necessary.
Here we talk about hardware and software technologies that no longer fit into the NSITF
electronic work environment and will need to be expunged or removed.
5.11 Hardware
Currently this device is inoperative and not in use, it was initially used as a security firewall but
the module has since long stopped working and its relevance and popularity has been overtaken
by events.
The much anticipated Sophos module tipped to replace the ISE module should be procured and
used to replace it.
22
10
This Oracle implementation is inoperative, unsuitable and has outlived its usefulness as the fund
is currently not operating data requiring Oracle storage. It is meant to be removed.
There are so many old and outdated legacy devices at the NSITF, these
devices/technologies/hardware needs to be expunged/expelled/removed from the electronic
workspace. They typically include laptops, desktops, printers, scanners, etc.
These devices have had their chipsets worked out over the years, keeping them in this work
environment is akin to forcing a dead man to go to work.
MACBOOKS
MacBooks are currently unsuitable for this work environment. Apart from the fact that there is
a learning curve attached towards learning how to use or familiarizing oneself with a MacBook,
it is not so user friendly compared with a Windows Machine.
There is a dearth of IT knowledge amongst the staff members of the fund, no need of
complicating it with the introduction of MacBooks. Windows are more suited since most the
server modules are windows and there is a windows dominance within the electronic workspace
of the fund.
22
11
5.11 Software
SPMS
This software technology concept will need to be expunged as there exists another software
technology this concept can be implemented inside it.
HRMS / SPMS
These two software technologies will need harmonization and integration as they both represent
almost the same concepts. SPMS should be a module within HRMS.
22
12
22
13
NEW TECHNOLOGIES
22
14
With the absence of such infrastructure, everything moves with a snail speed, staff will work
themselves out in a day and still don’t achieve meaningful progress. Quality of life reduces.
Technology and automation is the oil that drives development, advancement, innovations,
results, revenue and wealth. Since the emergence of infectious diseases, every relevant
private/public institution or entity around the world has embraced automation.
With technology and automation, you cut down excessively on your spending overheads, reduce
the rate of human errors, give staff more room to breathe, and achieve the desired results within
record time.
Without technology and automation, your revenue generation will fall far below what it is
supposed to be. You will be schemed out from areas you would have multiplied ten times what
you are currently making.
Since technology will bring about overhead cuts and maximize revenue generation, why don’t
we embrace it? If NSITF is doing 140, 000 employers or clients out of a pool of about a possible
3, 000, 000 employers, why can’t we use technology and increase the 140, 000 to 1,500,000?
And at the same time spend less in overheads by doing a lot of things like reducing the amount
of paper we print and mutilate the workplace with, the cost of printing physical certificates
22
15
where certificates can be automatically sent by the system to the email addresses of the
employers and be verified independently by calling the API interface of NSITF.
Here is a guarantee that with the right technology infrastructure put in place, revenue will be in
the region of 5 times of what is currently being made.
Fig 6.0 Research conducted by Aberdeen reveals that automation grows revenue by 220%
22
16
Business users worldwide are using automation to speed up formerly time-consuming processes
and close operations gaps that traditionally involve hours of manual spreadsheet work (and
frustrating manual error).
22
17
b. Self-service kiosks
A self-service kiosk situated within or outside of the office complex will help members of
the public make quick inquiries on the status of a lot of things and also log quick requests
for some other things instead of going inside to bother the staff.
Things like status of their compliance certificates, agreements, making requests for new
compliance certificates and other similar requests.
c. Power systems
Power backup systems will need to be rammed up. As pointed earlier about 40KVA
backup power is currently down and will need to be restored. A business environment
without adequate power will not only collapse but will fail to deliver the required services
to its clients and customers.
22
18
RISK MANAGEMENT
• Providing support and business information for enforcement purposes and procedures,
• Monitoring strict adherence to set regulations that ensure overall quality of NSITF operations.
• Analyzing and appraising risk issues from all departments, branches and regions.
22
19
• Creation of class and subclass classification of all institutions in Nigeria for the purpose of assigning
each to a class or subclass according to their risk status.
SERVICOM
• Vet charters of the fund,
• Coordinate meetings of stakeholders’ consultation forum on service delivery,
• Supervise the investigation and resolution of service complaints,
• Collation of quarterly reports on complaints.
CORPORATE AFFAIRS
They are charged with;
• Managing the company’s public image by Identifying and protecting the company from reputational
risks,
• Drafting Press Release and produces information materials for dissemination,
• Managing relations with both internal and external stakeholders of the fund.
LEGAL
• Provide legal advice and guidance on formulation and development of Board Policies and check
compliance,
• Ensures drafting, preparation and execution of contracts and other agreements on behalf of the Fund,
• Manage litigations.
22
20
PROCUREMENT
• Administration, planning, organizing and supervising the funds procurement processes,
• Evaluate Technical and Financial Bids as well as educating relevant vendors and customers on the
Fund’s terms and conditions,
• Establishment and maintenance of effective network with other organizations to identify value for
money initiatives,
• Supervise, motivate, develop and appraise staff to ensure they work effectively
• Issue a No Objection Certificate,
• Manage supplier companies and deliverables for the Fund.
• Liaise with the Legal department for the execution of contract agreements.
ADMIN/HR/
• Formulate and review strategies, policies and procedures with ensuring they are communicated and
implemented throughout the fund,
• Develops and maintains remuneration strategy and appropriate terms and conditions of service,
recruitment, selection and induction of staff,
• Workforce planning, succession planning, training, and management of core competences to ensure
best practices.
• Responsible for effective and timely resolution of payroll matters and variations update,
• Conveyance of management directives to Regions Branches and Departments
MAINTENANCE
• Conducts autonomous assessment of administration policies and procedures.
• Ensure maintenance work is carried out according to specification.
• Run Periodic Building Inspections, Facilities Management Service, Architectural Designs and
Consultancy Services, Vetting of Bills and Bids Evaluation
22
21
• MD
• the Board Secretary
• The Special Assistant to the Board Chairman
A hybrid software system is proposed for NSITF comprising of a multi-ERP (Enterprise Resource
Planning) system for internal controls, processing and local automation and a cloud-based
system that interfaces with the public on the internet which provides a bridge between NSITF
and its clients, partners, consultants, providers, contractors etc.
End User
application platform
The Public
Sync system
In the above image, the ERP system is connected to the cloud/internet-based user platform
through a synchronizer that synchronizes updates on the public user platform with the ERP
system since some of the data some departments such as enforcement or Claims use come from
external sources.
Members of the public use the cloud/internet-based user platform to communicate to the fund
and feed them with data to work with.
22
22
The synchronizer is important because we cannot afford to patch NSITF directly to the internet
application, this will have some serious cost that cannot be paid for, that is epileptic internet
source. So we will need a synchronizer to download data for the departments that require
external data to work with anytime the internet connectivity is good and also update immediate
changes.
So the relationship between the end user on the internet application with the staff at the NSITF
headquarters will mostly be an action-response hybrid system. The Public in the image refers to
members of the public who are either employers, contractors, partners etc and interface with
the NSITF via the cloud-based web application.
An ERP (Enterprise Resource Planning) system is a suite of application software built for an
organization’s local and internal processing and automation of all its services across its
departments and service branches.
So we deploy an ERP system in this hybrid setup, this ERP will contain a suite of applications for
all the departments at NSITF whereby each department has a module of its own catering for its
own internal processing and providing distinct features for each user.
This system first of all will have to take cognizance of the managerial structure, take into proper
account the different levels of management, roles and functions as contained in the fund’s
organogram and in the fund’s job description document, thereby assigning each staff and officer
the appropriate rights and privileges.
22
23
inter- real-time
departmental
activities notifications
unique user
environment
The notification system is designed to ring any user of an event that requires immediate
action such as when memos come into the department, it rings loudly for it to be received
We considered thoroughly the job descriptions of the different departments at NSITF and
also collected user feedbacks from our needs Assessment questionnaires dispatched to
departmental staff, and collectively designed a basic system functional requirements for the ERP
system needed at NSITF. The modules below are global modules, apply to all departments and
sub-departments.
Memo SMS
22
1
Periodic Trainings
Along with these are two other modules but not modules in practice but events, they are:
Exhaustive Data gathering will help in achieving more information and thorough needs
assessment while structural infrastructure design here will take care of the technical planning
phase of infrastructure, usage of programming algorithms in modelling data etc
Module Features
Organizational structure implementation This module is used to create the necessary
organizational structure with the
departments, sub-departments creation and
other processing, the designations structure
Memo This module is used to dispatch memos to
any department, and same memo is received
electronically by a member of that
department or the person the memo was
sent to directly if not initially sent to the
department.
22
1
Departmentalized modules
22
2
Claims and Claims management sub- Efficiently log and manage claim requests
compensations module made locally and from the internet by
effectively utilizing unique client id or
(Module) client identification number
Compensations sub-module Track and manage compensations which
automatically interfaces and reports back
to claimants both online and automated
emails and SMSes
Staff healthcare sub-module Managing and documenting staff
disability, severity, time etc and
providing documented support
22
3
(MODULE)
LEGAL Agreements sub-module This is used to keep, manage and
maintain a glossary of legal agreements
(MODULE) drafted, view and update status of each,
indicate documents inventory position.
This also interfaces with the
cloud/internet web application to inform
the public on the position of drafted
agreements.
22
4
22
5
(MODULE)
Contract sub-module A linked sub-module from procurement
where Audit can make investigations and
issue queries.
This platform interfaces with the public, it is a portal that is connected to the local ERP through
the synchronizer as depicted in figure 6.1. Almost every department has a module lying on the
cloud portal because most departments deal with members of the public.
The Cloud
Background AI services
The public
22
6
In the figure above the members of the public interact with NSITF data services through the user
web application residing on the internet cloud. The cloud platform has background AI (Artificial
Intelligence) services brokered by an AI middleware acting as a bridge between the users and the
cloud platform making decisions, confirmations and sending feedbacks, mails, SMSes,
certificates etc.
The public users are the ones that send in most of the public data NSITF work with. So we look
at these modules that are supposed to be on the cloud web environment.
Claims and Web user sub-module Public users submit claim requests, get
compensations updates, feedbacks etc
(Module)
LEGAL Web user sub-module Users can make inquiries on the status of
their legal agreements online for
(MODULE) awarded contracts.
PROCUREMENT Web user sub-module Contractors can view information on
their bids, evaluations, prequalifications,
(MODULE) awards and also give feedback on the
status of their work progress etc
22
7
We have to do away with the multitude of papers within our environment which has filled up
every physical space within our offices.
We will have to do away with this unsustainable culture of flooding our work spaces with papers
and save a lot of money spent in printing, starting from automating memos.
With this;
Automation will greatly help the staff of NSITF. They work too much. This attitude is synonymous
with systems where human intervention and effort is greater compared to automation, the result
or progress will be below par and slow respectively.
With automation staff will have more room to breathe, also augurs well for staff insurance policy
where automation helps reduce likelihood of staff breakdowns and improves the quality of life.
Employers’ certificates
Worthy of note is the issue of employers’ certificates that is still manually printed and issued. In
this 21st century this is quite unacceptable, artificial intelligence is supposed to take care of this
end of the process whereby we use it to evaluate clients who have met required criteria for the
issuance of certificates and system automatically generates such certificates and emails them
with it and no human effort is expended in this process.
The certificates can still be printed by them when they log into their user environment on the
new proposed employers’/clients portal, any further proof or clarification of such certificate can
be done independently by any organization by querying the issuance number on NSITF portal
just like Corporate Affairs Commission (CAC) website where companies and company records
can be found and an API can also be provided for organizations to integrate and verify on the fly.
22
8
EVENTS TIMELINE
22
9
Software Infrastructure
From the section 6, we can deduce that the required software infrastructure for a sustainability
plan for business development is quite extensive and will require tact in terms of
implementation. For the software infrastructure implementation, we currently have:
• 15 global modules
• 35 departmental sub-modules (15 departmental modules)
• 4 modules on the web cloud
• 1 module here is for more intense data gathering
• 1 module again is for detailed infrastructure planning, modelling and schematics
This involves 23 departments and many sub-units. Our activity timeframe is 60 months which is
5 years. And we have to implement 56 modules within this period. We have 5 years to
implement the technology plan, deploy and train staff.
The most effective plan is building technology in little chunks, run trainings, provide mid-term
support and move on to the next set of tasks so that affected departments can get on
immediately, start working with minimal support while other departments get on board.
22
10
Year 1
1st Month Extensive data gathering on all the
2nd Month departments, all the processes, workflows
3rd Month and others
4th Month Detailed structural infrastructure design,
modelling and schematics
5th Month Reports, charts and data analysis
6th Month Data exports
SMS
Email
Payments
In-app notifications system
Search module
7th Month Organizational structure implementation
8th Month Memo
9th Month Archiving
10th Month Trainings
Dashboard charts
Work Attendance
11th Month Application Testing, 1st term deployments,
12th Month Training engagements on new infrastructure,
Year 2
1st Month Mid-term support and maintenance.
2nd Month
3rd Month Claims Web user sub-module
4th Month Enforcement Web user sub-module
5th Month Claims management sub-module
6th Month Compensations sub-module
7th Month Staff healthcare sub-module
8th Month Enforcement
9th Month Employee/client sub-module
22
11
Year 3
1st Month Mid-term support and maintenance.
2nd Month
3rd Month Legal Web user sub-module
Procurement Web user sub-module
4th Month Agreements sub-module
Litigations sub-module
(Research sub-module comes much later)
5th Month Procurement sub-module
Contract management sub-module
6th Month Application Testing, 3rd term deployments,
7th Month Training engagements on new infrastructure,
8th Month Mid-term support and maintenance.
9th Month
10th Month Human Resources
11th Month Staff records sub-module
12th Month Staff interactivity sub-module
Payroll sub-module
Leave sub-module
Year 4
1st Month APRD
Event management sub-module
22
12
Report sub-module
nd
2 Month HSE
Inspections sub-module
Audit sub-module
Ranking sub-module
3rd Month Application Testing, 4th term deployments,
4th Month Training engagements on new infrastructure,
5th Month Mid-term support and maintenance
6th Month
7th Month Investment
Facility Manager sub-module
Funds manager sub-module
8th Month Servicom
Service management sub-module
9th Month Social Security
Programmes sub-module
10th Month Application Testing, 5th term deployments,
Training engagements on new infrastructure,
11th Month Mid-term support and maintenance
12th Month
Year 5
1st Month Maintenance
Facility Manager sub-module
Billing sub-module
Bids Evaluation sub-module
2nd Month Finance system sub-module
Pension sub-module
3rd Month Audit
Query sub-module
Contract sub-module
4th Month Application Testing, 6th term deployments,
5th Month Training engagements on new infrastructure,
6th Month Full-term support and maintenance for the
7th Month entire deployed software infrastructure
8th Month
22
13
9th Month
10th Month
11th Month
12th Month
22
14
SUPPORT FRAMEWORK
22
15
Support Framework 8
There is need for extensive support and maintenance framework from in-house ICT staff and
respective service providers. A lot is going on with the current infrastructure and little is said or
done about it. If attention is not paid to the fact that adequate support of the current existing
infrastructure has to happen, we may be witnessing gradual decline of performance and
efficiency of existing ICT infrastructure at the NSITF.
With a good support and maintenance framework, the computers, laptops, printers, scanners,
copiers, network devices, power systems, cooling systems, server hardware and even
proprietary, custom or third-party vendor application residing on the computers will rarely
work.
So we have created a support framework for all the current existing infrastructure and will also
be useful for additional infrastructure that will come later.
Laptops/Desktops
Printers/Scanners/Copiers
Cooling Systems
SUPPORT
MAINTENANCE Power Systems
Servers/Network
Network Infrastructure Equipment
Components
22
16
Currently most service level agreements are either inoperative or expired. Service providers
responsible for most of the physical infrastructure must be re-engaged and re-contracted. Their
absence is wreaking havoc on the current infrastructure as the necessary support and
maintenance is unavailable.
Backup power
As previously stated, a section of the backup powers system is down and needs to be re-
instated. Two 20 KVA supplies are down and not working. Only one 20KVA system is working
for the data center. The Two 20 KVA serves as the power base of the fund, at a time it’s
absence will be greatly felt.
Things such as network connection ports in various departments are going blind causing a
myriad of issues such as lost packets, increased latency, parity errors, impaired bandwidth and
cyclic redundancies
Year 1 – Year 5
1st Month Auditing desktops for compliance with IT
policies. For example, approved and
unapproved software, internet usage,
approved websites and disk space.
22
17
22
18
22
19
9.0 Recommendations
It is strongly recommended that MainOne replace the current Cloud services provider as
MainOne is far better in any dimension the comparison is done. MainOne Cloud is also a
government-licensed government-data cloud services provider, so they benefit from the same
government policy the current cloud provider enjoys.
• MainOne Support is better than any of the existent providers in their category
• Services across all MDAs they provide service for is better
• Recently acquired by an American company as a result of their success.
• MainOne Cloud is used by NITDA and so many other federal government agencies
• MainOne has fiber infrastructure across West Africa
The in-house development team should be given all the needed support to complete the
projects they’ve embarked on most especially the HRMS. They have produced some level of
automation in some of these projects they are currently working on, with the right tools like
more laptops, computers and support they will be able to do more.
For the remaining part of the software infrastructure, it is recommended that a validly sourced
third party technology platforms provider or vendor be drafted to provide the service. They will
be providing the entire software infrastructure, support and maintenance. Reasons for this
being that:
• Liabilities incurred from such endeavors is better transferred to a provider who is bound
by well-written Memorandum of Understanding, Service Level Agreements, Non-
disclosure agreements, that will always guarantee that the expected service is delivered
22
20
and within the agreed time and that infrastructure will not be abandoned, reproduced
or confidentiality divulged to any other party, failure for which there will be
consequences they wouldn’t want applied as stipulated in their terms of service.
NSITF headquarters needs expansion as workspace is so stuffy, little breathing space and digital
equipment, cables and others are so close to each other.
22
21
Add-Ons 10
There are add-ons that came with this project. This is to help pilot the fund to it’s much desired
status and position.
4 copies of the recommended laptops and desktops as quoted in section 6.1 have been
attached with this project. This is to aid the work of the ICT and support the general workforce.
Also attached herein is a 2 Terabyte cloud storage for backup of NSITF applications
22
22
Conclusions 11
At the end, this project ended well. The project team was tacit in their duties while they
collected all necessary information, conducted and supervised different categories of tests and
finally processed collated data.
It is very important to note here that the staff of the Information and Communications
Technology department are made up of brilliant professionals who immensely provided the
much needed assistance and resources required to see this project concluded.
We owe much thanks to them and the Management of the Nigeria Social Insurance Trust Fund.
Much of the software needed to automate all the branches of NSITF are already in our coffers
as we have had several years of experience in the providing large-scale enterprise
infrastructure.
22
23
Real-time notifications
22
24
Staff Appraisals
22
25
22
26
Procurement software for procurement department from our World bank procurement project
for Bauchi
Facility manager for investment and maintenance department from our facility manager software Agent53
22