Presentation is loading. Please wait.

Presentation is loading. Please wait.

1. 2 Mike Giovinazzo Director, ESD Government On-Line: The view from Ground Zero ECC Symposium 2001.

Similar presentations


Presentation on theme: "1. 2 Mike Giovinazzo Director, ESD Government On-Line: The view from Ground Zero ECC Symposium 2001."— Presentation transcript:

1 1

2 2 Mike Giovinazzo Director, ESD Government On-Line: The view from Ground Zero ECC Symposium 2001

3 3 Government Focus “By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.” Government On-line Initiative

4 4 Government On-line: Objectives Improve services to Canadians Increased Efficiency and cost reduction Create a government for 21st Century Serve as catalyst for EC Improve services to Canadians Increased Efficiency and cost reduction Create a government for 21st Century Serve as catalyst for EC

5 5 World Wide Opportunity While The US grows at compound rates the rest of the world will grow even faster. This spells great opportunity for Canadian firms.

6 6 Adoption Hype Cycle

7 7 Observations & Challenges Early adopters / Pathfinders

8 8 Major Themes Security Privacy Common Look & Feel Anticipating Complexity Legacy Integration Challenges Managing Expectations Business Reengineering & Policy Funding/Scheduling Limitations

9 9 Security TRUST - The cornerstone of security

10 10 Security Many assume PKI is the answer, but...

11 11 Security PKI is mostly policy not technology Select your goal(s):  Encryption(Confidentiality),  Data Integrity,  Authentication,  Non-repudiation PKI is mostly policy not technology Select your goal(s):  Encryption(Confidentiality),  Data Integrity,  Authentication,  Non-repudiation

12 12 What Level of Security ?

13 13 Mutli-channel considerations Different access channels have different authentication requirements

14 14 Personalization Vs Privacy

15 15 Coping with Privacy Horizontal Integration  Is privacy in conflict with validation e.g. “confirm sin ### ### ### = NAME ”  For a student loan... how to confirm you are a single parent Vertical Integration  Data exchange with provinces or private enterprise Horizontal Integration  Is privacy in conflict with validation e.g. “confirm sin ### ### ### = NAME ”  For a student loan... how to confirm you are a single parent Vertical Integration  Data exchange with provinces or private enterprise

16 16 “common look and feel” Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users  sacrifices too much screen real-estate (copyright, federal identity, …)  strict standards (search engine, resolution, frames, accessibility...) “Application” focused standards under development Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users  sacrifices too much screen real-estate (copyright, federal identity, …)  strict standards (search engine, resolution, frames, accessibility...) “Application” focused standards under development

17 17 “common look and feel” "Too often in the past, government services were designed from the "inside out"; they reflected the structures of government organizations more than the needs and priorities of citizens. … We cannot stop until all Canadians can have seamless access to all government services quickly, simply and with a minimum of fuss". Privy Council Seventh Annual Report to The P.M.

18 18 4. Supply Line Integration 3. Legacy Integration Evolution of Web Presence 2. Limited Web Transactions Complexity Value 1. Web Site

19 19 Managing Complexity Browser Servlet Container EJB Container Application Servers Relational Database O/R Mapping Graphic Artist Server-Side Developer Client-Side Developer

20 20 Managing Complexity Application Services JTAJTA Data Access Engine (DAE) Database Drivers Transaction Manager Encina Event Log Support Synchronizer State/Session Conn. Pooling Streaming Result Cache Security (ACL) Directory Service (LDAP) Web Connectors NSAPI, ISAPI, CGI Encryption Plug In Load Balancer Plug In Application Logic Processing HTML, JSP, Servlets Presentation Layer EJB JDBC, JTA Data Access C/C++ Business Layer Request Manager Queue Manager Tread Manager Request Security Manager Request Management System Load MonitorLoad Balancer Load Balancing System Protocol Manager HTTP CGINSAPIISAPI NAS Protocol IIOP OCL Service Administrative Services & SNMP Integration

21 21 Simplified Framework Internet Access Back-end Systems Interface Services Application Services Infrastructure Security Services Presentation Services Client Security  Planetworks Interspace  Visual Age for Smalltalk, Coldfusion, Metro, Edify, Silverstream and MS Transaction Server  Borderware Firewall and Checkpoint Firewall  Netscape Server, Microsoft IIS, Oracle Webserver, Visual Age for Smalltalk, Coldfusion, Metro, Edify & Silverstream and Apache Web Server  Entrust Suite, Secure ID and Gradient NetCrusader  Netscape Browser, MS Internet Explorer and all access methods  CICS, DB2, Oracle

22 22 Internet Access Application Services Presentation Services Internet Access Application Services Infrastructure Security Services Presentation Services Client Security Internet Access Back-end Systems Interface Services Application Services Infrastructure Security Services Presentation Services Client Security Levels of Complexity

23 23 Managing Expectations Internally  Secure channel’s role/capability  We expect everyone to access our site Externally  Public wants 7/24  new medium means new service levels  choice of channel  “digital divide” means more $ not less  “single window” Internally  Secure channel’s role/capability  We expect everyone to access our site Externally  Public wants 7/24  new medium means new service levels  choice of channel  “digital divide” means more $ not less  “single window”

24 24 Business Re-engineering & Policy In self service applications  Who takes responsibility for data accuracy ?  What is the impact of system unavailability ? Policy vs Organisational Efficiency In self service applications  Who takes responsibility for data accuracy ?  What is the impact of system unavailability ? Policy vs Organisational Efficiency

25 25 Training Object-Oriented techniques Component based architectures Stateless processing GUI design Object-Oriented techniques Component based architectures Stateless processing GUI design Formal SDLC / methodologies Configuration Management Batch processing Legacy Integration

26 26 Funding / Scheduling Limitations Cost of PKI and CA  Recently funded centrally 153 submissions for funding (July 31, 2000)  Total request funds $235 Million  27 pathfinders funded ( approx. $60 Million ) Timelines are set but infrastructure like Secure Channel is not ready Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004 Cost of PKI and CA  Recently funded centrally 153 submissions for funding (July 31, 2000)  Total request funds $235 Million  27 pathfinders funded ( approx. $60 Million ) Timelines are set but infrastructure like Secure Channel is not ready Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004

27 27 Any Questions ? Thank You

28 28


Download ppt "1. 2 Mike Giovinazzo Director, ESD Government On-Line: The view from Ground Zero ECC Symposium 2001."

Similar presentations


Ads by Google