Presentation is loading. Please wait.

Presentation is loading. Please wait.

Face2Face Forum – Netherlands

Similar presentations

Presentation on theme: "Face2Face Forum – Netherlands"— Presentation transcript:

1 Face2Face Forum – Netherlands

2 Agenda Progress Software Update
Colleen Smith OpenEdge Business Strategy and Product Roadmap Rob Straight User Interface Options and Directions Mike Ormerod Addressing Security & Compliance Issues Using Actional with your OpenEdge Application

3 Funding and new media strategy focused on Progress company awareness, under the tagline “Business Making Progress”

4 How Business Makes Progress
Progress enables organizations to achieve the highest level of business performance We call this Operational Responsiveness We enable our customers and partners to deliver RESPONSIVE APPLICATIONS with FASTER TIME-TO-VALUE Every product we make enables companies to attain the highest level of business performance. We call this level of achievement “Operational Responsiveness” And we do this By providing the highest level of business visibility, responsiveness and business process improvement with the most complete and accurate data Everything you will see today is built around this

5 Pressures to Evolve or Perish
Anticipate & Respond Operational Responsiveness Is a Must Have Customer Demand Technology Inhibitors We’ve all seen a million presentations talking about the cost pressures businesses are under. But businesses are running out of options to actually address these pressure. The last year poignantly emphasized the need to do “more with less” – to both cut costs and to optimize revenue. And of course there is always the need to launch new revenue generating services rapidly $$$ Pressures New revenue generating opportunities Maximize profitability Reduce cost Customer Demands All of this in the face of the need to maximize customer loyalty and make high value customers feel special –even if flights are delayed Competitive Pressures Customer satisfaction and loyalty Outmaneuver Competitors Time to market And the requirement to figure out what competitors are doing and outmaneuver them The new frontier for achieveing this is real-time. Businesses must be able to antipate and respond to ensure high value customers are handled appropriately and that competitor activity can be outmaneuvered Businesses have squeezed out in many cases as much cost from operations as possible using traditional means. Now the new frontier requires businesses to dynamically optimize. However, there are some barriers to this from technology. Technology Pressures Event Deluge Challenge measuring legacy “implicit processes” BPM is not adaptive – it has many benefits for rapid time to market and visibility but processes currently cannot adapt in real-time to occurrences in the environment What is needed is the ability to measure and augment legacy without rip and replace And all the benefits of business processes but with adaptation to what is happening and what is about to happen within the business There is now an imperative to be able to achieve this. OR is a MUST HAVE Competitive Pressures

6 Delivering Operational Responsiveness
Responsive Process Management Responsive Information Management Responsive Business Applications Start with with responsive tags, then finish with how it looks now JB: we have aligned our product businesses into 3 categories to address 3 key aspects of OR.

7 Delivering Operational Responsiveness
Responsive Process Management Responsive Information Management Responsive Business Applications Enterprise Business Solutions Enterprise Data Solutions Application Development Platforms Start with with responsive tags, then finish with how it looks now

8 Enterprise Business Solutions
Delivering Operational Responsiveness with Responsive Process Management Visibility, Sense and Respond, Continuous Process Improvement Ability to respond and apply corrective actions Anticipate what WILL happen in your business, not react to what HAS happened Continually improve the business processes without disrupting existing infrastructure Responsive Process Management Driving Operational Responsiveness through event driven visibility, dynamic business response and continuous business process improvement Enterprise Business Solutions Progress has leading product Actional - Business Transaction Management BTM Apama - Complex Event Processing CEP Savvion - Business Process Management(BPM Sonic - Enterprise Integration with Sonic Together they can deliver advanced Responsive Process Management solutions. You will hear more about the drivers behind aligning these products in the next presentation

9 Key Elements of a Business Process
Information People and Systems Workflow Description + + Business Rules Metrics & Measurements In addition to sequence of activities that is defined by the process diagram or workflow description, it also describes who does a particular activity. And if that activity is done by a person or a system. Order entry is done by a sales person where as credit check is done by a system step that calls on a service from FICO. It also contains information like input and out put from each step if it is an Order Management Process that it contains information about customer name, billing and shipping address and what the customer has ordered and when is the delivery date etc. It also consists of business rules i.e. rules and policies that govern the process. In the same example an order more than $1000 may be eligible of 15% discount and any overseas order needs to go through a legal approval, are some of the rules. Every process has some metrics, KPIs or SLAs that are required to be met, these are defined by the business and need to be monitored in real-time to ensure the proper running of operations. We may specify that the any order must be completed within 2 hours and would like to know if there is any chance that we are going to miss any SLA. So, let’s take a look at some of the examples of the processes… Process + =

10 We work in Global Distributed Heterogeneous Environment
People Technology & Systems Complexity of today’s business is that business is distributed globally and business processes span across systems, departments, partners and customers. We need to be able to work efficiently in this environment and make sure all participants in the business have a common understanding of the process and are aware of their role in the business. Processes are locked in packaged applications or systems and there is no single end-to-end process. Manually intensive processes are Chaotic, disorganized, ad hoc and error prone There is a lot of Wasteful activities with paper based processes with long cycle times This situation leads to 1. Informal Tasks and Communication (ex Paper or ) – there is no traceability 2. Inconsistent processes and customer experience 4. Incomplete or Inaccurate Data Flow Between Systems 5. Lack of Control Over System and Business Events (Exceptions) 6. Poor Visibility Into Process Performance So we need a process model that ties together the people and systems and make business more efficient. And we’ll see how it is done. Need for common understanding and awareness of role

11 Improving Processes Executed in Distributed Heterogeneous Environment
People Process Technology & Systems The philosophy of Process Management makes your business process driven A process model brings together different systems and people together in a single model driven environment BPM enables businesses to coordinate cross functional processes – it’s about breaking down silos Process driven businesses leverage their core systems for what they are best at and fill in the whitespaces between your systems to deliver end –to –end process management. So Process Management allows you to – manage end 2 end process. 1. Automatically Prioritizes and Routes Work 2. Guides users through decisions 3. Standardizes resolution across geographies 4. Leverages existing systems and data 5. Monitors for business events and initiates action in case of any exceptions 6. Real-time visibility and process control Prioritizes and monitors events, while initiating actions

12 Why BPM? - Gartner Goal: Application Modernization
Improve visibility and change management Goal: Broader and better coordination of processes - Workflows Rapid time for new application Extension to existing applications Goal: Continuous Process Improvement Business transformation Goal: Business agility for key processes Process re-design Process flow deployment by organization

13 Key Components of Progress Savvion BPM
Process Modeler BPM Portal BPM Studio BPM Server Process Asset Manager BusinessExpert We have comprehensive integrated BPMS suite. Flexible support for BPA, BPMS and BPI We offer BPA, BPMS and BPI products they can be used independently. Customers can expand from one to other. PAM – is the central repository where business users can store their process and manage versions. You can also store various process components like subprocesses and integration adapters for reuse. So it serves 2 key purposes one collaboration and second reuse. BPM studio is the IDE for development , they can take the model created by business users from the PAM and add integration and other elements to it and deploy from the studio on to server with single click deployment. Now your process based applications is ready for end users. End users interact with the process application from the portal. Here they will get their tasks and use the UI to complete their tasks. They will monitor the process performance on the dashboards and also can make any rule changes that they need to make in the process. There is full audit trail and collaboration capabilities in the portal. The BusinessExpert allows Business users to define metrics, it sends notifications to users if there is anything wrong in the business, provides interactive process analytics and gives recommendations on how to improve the process. In addition there are other components that allows you to create enterprise classs process applications. Like BRMS for decision centric applications, DMS for document centric, CEP, Transaction management , ESB and Data access provide all necessary components to create next generation BPM soluions. Business Rule Management System Document Management System Business Event Processing Visibility Into Integration Processes SOA Infrastructure Information Access and Integration

14 Enterprise Data Solutions
Achieving Operational Responsiveness with Responsive Information Management Responsive Information Management Enterprise Data Solutions Enterprise information is fragmented It is critical to maintain process performance Responsive process requires the Right Information, in the Right Form, at the Right Time Driving Operational Responsiveness by delivering the fastest, most flexible data access and integration platform for unifying, delivering, and exchanging enterprise information Progress is a leader today in connecting to and delivering Enterprise information to business applications with our Connect and Shadow product lines. We will talk to you more today about how we are expanding that leadership by providing a suite of Enterprise Data Services products.

15 Application Development Platforms
Delivering Operational Responsiveness with Responsive Business Applications Responsive Business Applications Application Development Platforms Simplify the creation of service-enabled applications Provide deployment flexibility for public and private clouds Continuously ease new technology adoption Driving Operational Responsiveness by delivering the industry’s best business application development platforms with the fastest time-to-value Cheat sheet: Simplify – leveraging our long term core value of ease of development and deployment Flexibility – recently certified on Amazon EC2 Multi-tenancy – patent pending release 11 (end of 2010)

16 Business Application Evolution
From a User’s perspective: “Get a Login” Delivery of Application or Service Applications & Services Pricing/Usage Models Devices & Users Ecosystem/ Collaboration Application Development Platform A complete “in the box” Platform for ISVs, Business Service Providers, and Direct End Users looking to optimize Service Delivery in the Cloud Personalization/ Mobility Multi-tenancy User Interface Flexibility Security & Compliance Business Logic Data Management Integration/ Workflow Model-Driven Tools/Architecture Deploy in the Cloud (Public or Private) Infrastructure Scalability Reliability Service Level Management Virtualization Hardware Network 16 16

17 What is Cloud Computing?
A style of computing where scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies. – Gartner, August 2009 Cloud Consumers Pay just for what you use– low price of entry Simple self-service, scale up or down with global reach Focus on differentiation, not infrastructure Development Process/Service Creation Deployment/Application Delivery Automated provisioning Efficient utilization and monitoring Simple management Cloud Services Cloud Providers (can be private)

18 Strategic issues for CIOs in 2010
What is your cloud-computing strategy? What are the business problems it will solve? What are the business opportunities it will create? What is your timetable for delivering those capabilities?

19 Why SaaS/Cloud? For Application/Service Development Organizations:
Access to more users Gain economies-of-scale Reduce costs Standardization of offerings Greater focus on core competency

20 Why SaaS/Cloud? For Application End-users Predictability
Rapid time to value More deployment flexibility Cost effective Dynamic interaction

21 OpenEdge Roadmap Rob Straight – Senior Manager, Product Management

22 OpenEdge Vision OpenEdge will become the leading SaaS Platform for ISVs and Business Service Providers to simplify service development and delivery for the Cloud resulting in greater Operational Responsiveness Proof points: The industry’s first true multi-tenant database – Release 11 Flexible deployment to a wide variety of public and private cloud providers The leading SaaS enablement program for ISVs and BSPs Large, growing community of SaaS providers

23 OpenEdge Business Initiatives
Application Modernization Continue to Provide Competitive Technology Expand Value With Other Progress Products Continued Growth Acquisition of new customers through partners Innovation through software as a service (SaaS) Strengthen the OpenEdge Market Position Differentiate OpenEdge in the market Aggressively expand market awareness

24 7 Keys to Success Multi-tenancy Going from 1 to N Security & Compliance Ensuring that data and applications are accessed only by those who need to know User Interface Flexibility Being able to easily use the UI technologies that meet the needs of the customer Personalization Ensuring the application looks like the tenant and end-user want Integration/Workflow Ability to easily integrate to any other application and provide workflow/process integration Operational Excellence Always available and scales to any size Productivity Provide a highly productive environment focused on OpenEdge and industry best practices The OpenEdge strategy outlines these 7 keys to success with SaaS. We’ll see how 10.2B features fit into that strategy. 24 24

25 OpenEdge 10.2 Release Summary
2008 2009 Q4 Q1 Q2 Q3 Q4 10.2A UI Flexibility OpenEdge GUI for .NET Operational Excellence OpenEdge Explorer Productivity OpenEdge Architect enhancements More object-oriented extensions 10.2B Security & Compliance Transparent Database Encryption UI Flexibility OpenEdge GUI for .NET usability Operational Excellence Actional for OpenEdge Alternate database buffer pool Productivity OE Architect new user support, and ease of AppServer development JSON support To summarize, the OpenEdge 10.2 releases (10.2A and 10.2B) provide significant new capabilities in support of the 7 Keys to Success.

26 Operational Excellence
Deploying To The Cloud Operational Excellence Getting to the Cloud with Ease Community of end-user customers Engaging with our customers Amazon EC2 Support 10.2A/10.2B certified Best practices and getting started guides Cloud Deployment - Future OpenEdge runtime in the cloud Other public cloud platforms Push-button deployment Business Services Software Services Advanced development Technology Services Management Services

27 OpenEdge Takes You There
Continuous Evolution through the IT paradigms It’s always been about Business Applications New, innovative, but evolutionary Builds on proven foundation Controlled and steady growth—parallels what our partners need to deliver industrial-strength business solutions Why is it able to do this?: Has been based on OPENness: The OPENness is OUR competitive edge—we’re unique in the industry to offer am open platform that coexists easily with any other standard technology. This means that our partners and their customers can leverage their existing investments. NOTE: while each major release had a theme, we didn’t only add new features to support these themes. We made feature enhancements to all areas of the product set with each release. OpenEdge 11 Eases SaaS/Cloud Computing OpenEdge 10 Enabled SOA V9 Delivered Distributed Computing V8 was Client/Server 27

28 Roadmap Information D I S C L A I M E R This roadmap is for informational purposes only, and the reader is hereby cautioned that actual product development can, and often does, vary significantly from roadmaps. This roadmap may not be interpreted as any commitment on behalf of Progress, and future development, timing and release of any features or functionality described in this roadmap remains at our sole discretion. This presentation includes discussion on features and capabilities that are under consideration and not currently available. This discussion should not be construed as a commitment on the part of Progress Software to deliver new features and capabilities in any specific timeframe. D I S C L A I M E R 28

29 Infrastructure Tenancy
Multi-Tenancy Isolated Tenancy Infrastructure Tenancy Application Tenancy Shared Tenancy Tenant2 Tenant3 App DB Infra. Tenant1 Tenant1 Tenant2 Tenant3 App DB Infrastructure Tenant1 Tenant2 Tenant3 DB Infrastructure App Tenant1 Tenant2 Tenant3 App DB Infrastructure Isolating Sharing Sharing, best when… Customizations not required. Separate versions not required. It offers the least cost to serve, but data security and version and performance control (per customer SLAs) may be issues For commodity applications Isolating, best when… Customizations are required. Multiple versions are required. Implementation cost is not the most important driver Easier performance control (per customer SLAs). For specialized applications Application Shared nothing: Separate instances per tenant, different versions different code-bases, customizable Shared version: Separate instances per tenant, same version single code-base, configurable Shared instance: One instance shared for all tenants. Limited scalability Shared platform: Multiple instances shared for all tenants Infrastructure and services Shared nothing Shared hardware, OS and services. Separate application infrastructure Shared all: Hardware, OS, services and application infrastructure Data Shared data store, no custom/extended schemas Shared data store, custom/extended schemas Easier customization, security Simpler throttling control Target dissimilar customers No transformation Better economy of scale Simpler management Target like-customers Least cost to serve

30 Multi-Tenant Tables Multi-tenancy built into the database
Simplify Development of Multi-tenant Applications Multi-tenancy built into the database Data physically partitioned by tenant identity Built-in tenant level authentication Minimal application changes – just set a per-database tenant id Customer Schema 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet Tenant 1 partition 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Tenant 2 partition 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet Tenant 3 partition

31 Multi-Tenant Tables: Data Access
Multi-tenancy Simplifies Development of Multi-tenant Applications Keys unique per tenant or unique per table Customer Schema Tenant 1 partition 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Tenant 2 partition 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet Tenant 3 partition

32 Multi-Tenant Tables: Data Access
Multi-tenancy Simplifies Development of Multi-tenant Applications Keys unique per tenant or unique per table Query is tenant specific Customer Schema Tenant 1 partition 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet Tenant 1 Partition FIND CUSTOMER WHERE CUST_NUM=2. 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Tenant 2 partition 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet Tenant 3 partition

33 Multi-Tenant Tables: Data Access
Multi-tenancy Simplifies Development of Multi-tenant Applications Keys unique per tenant or unique per table Query is tenant specific “Super” tenant query Customer Schema 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Super Tenant For each customer: Display cust-num, name 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet

34 Multi-Tenant Tables: Data Access
Multi-tenancy Simplifies Development of Multi-tenant Applications Keys unique per tenant or unique per table Query is tenant specific “Super” tenant query Tenant ID virtual column Customer Schema 1 1 Lift Line Skiing 1 2 Urban Frisbee 1 3 Hoops Croquet 2 1 Thundering Surf 2 7 Fanatical Athletes 2 8 Game Set Match Super Tenant For each customer: Display tenantid(customer), cust-num, name. 3 2 Hide Tide Sailing 3 7 Pedal Power 3 9 Hoops Croquet

35 Multi-Tenant Tables: Tenant Provisioning
Multi-tenancy Simplifies Development of Multi-tenant Applications Tenant creation via DDL & Dictionary Identification (via schema table) Database specific tenant ID User friendly names App specific IDs Tenant level activation/deactivation Runtime security by user by tenant Governors: Limit resource usage Customer Schema 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet Tenant 1 partition 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Tenant 2 partition Resource usage are such things as # logins, -L, txn size/duration, -B usage, etc. 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet Tenant 3 partition

36 Table Partitioning Types of Table Partitioning
Operational Excellence Types of Table Partitioning Range- the key is within a range of values, e.g. year, territory, invoice amount, etc. List: each partition is assigned a list of values, e.g. male/female, country, etc. Composite- a combination of Range and/or List Phase 1: The Foundation for Multi-Tenancy Initial use case of tables partitioned by tenant ID Focus of OE11.0 Phase 2: Horizontal Data Partitioning (Range/List) Focus of OE11.1

37 Operational Features of Multi-Tenancy and Table Partitioning
Excellence Customer Schema Partition Maintenance Object move Add/drop tenants/objects Backup/restore, recovery Data dump/load Index maintenance tools Monitoring 1 Lift Line Skiing 2 Urban Frisbee 3 Hoops Croquet Tenant 1 partition 1 Thundering Surf 7 Fanatical Athletes 8 Game Set Match Tenant 2 partition Resource usage are such things as # logins, -L, txn size/duration, -B usage, etc. 2 Hide Tide Sailing 7 Pedal Power 9 Hoops Croquet Tenant 3 partition

38 Multi-tenant AppServer
Multi-tenancy Operational Excellence Application Tenant A User A1 Login Session A1-1 Tenant B User A2 User B1 User B2 Login Session A1-2 Login Session A2-1 Login Session A2-2 Login Session B1-1 Login Session B1-2 Login Session B2-1 Login Session B2-2 Context Management built into the AppServer Supports multi-tenancy in addition to general use 4 levels: Application, Tenant, User, Session Context automatically switched on a request basis as needed

39 Context-Managed AppServer
Application Server Agent Application Server Broker Context Data Cache Context Management Storage Service ABL Batch Loader OE Database DEFINE CONTEXT-TABLE PriceList FOR “TENANT” Context management service pre-loaded with context for performance Data cache shared across agents Declarative approach simplifies development

40 High Availability – 24x7 Production Operation
Operational Excellence High Availability Through Online Operations, Robustness, and Improved Diagnostics Near-100% Online Database Maintenance Improve performance of DB utilities (index rebuilds, table & index moves, migration to Type II storage areas) Avoid application restarts for DB schema changes Server Property Changes in Real Time No need to stop and restart the server Improved Ability to Monitor AppServer Better error diagnostics R-code monitoring

41 High Availability – Performance
Operational Excellence Maximize operating performance Table Scans Without Overhead of Using an Index If entire table needs to be scanned, using the index adds overhead Auto Update of SQL Database Statistics Optimizer has more current information, leading to increased database performance Dynamic Query Join Optimization for DataServers

42 Taking You Higher With OpenEdge 11
Security & Compliance Personalization Built-in authentication and authorization system Ajax tools Microsoft WPF/Silverlight JSON-RPC Latest Web services standards REST Database multiple linguistic sorting Actional – payload, DB interceptor Manage remote jobs OpenEdge Architect Object-oriented extensions- remote objects, reflection User Interface Flexibility Operational Excellence Integration Productivity

43 43

44 OpenEdge User Interface Options and Directions
Flexible and open support for leading RIA technologies What is RIA Personas App types & mapping to technology Technology landscape Why not just Ajax Mapping personas and technology Our recommendations and how to do with OpenEdge Mike Ormerod– Architect, SaaS and Cloud Computing Strategy

45 Rich Internet Applications- The Best of “Both Worlds”
Extend the market of a traditional desktop application with the reach of a web application Multi-platform support No installation or automated install and updates Enhance the user experience of a web application with the richness of a desktop application Look and feel of desktop applications Increased productivity for user A Rich Internet Application's key job, is to move the ability to do work to the web.* Tony MacDonell Teknision Inc. Combine the flexibility, responsiveness and ease of use of desktop applications with the broad reach of the Web. - Ken Wilner RIA for me is all about expanding the experience for the user.* Raymond Camden Camden Media, Inc.

46 Framing the RIA Market: Three User Personas
The Infrequent User Needs access from anywhere Uses application rarely and briefly Demands immediate feedback Expects familiar web usage pattern Needs intuitive UI with no training The Occasional User Needs access from limited locations Uses app periodically and for a short time Limited setup acceptable Willing to use new usage paradigms Can learn as they go The Power User Works from same location every day Uses application most of day Initial setup okay with clear benefits Expects domain-specific features, desktop integration Productivity is top priority, training expected

47 Information-based pages
Three Types of RIA Applications Mapping Each to an RIA Technology Choice Information-based pages Browser-based with some interactive controls No desktop integration; supports all platforms Navigational elements: Hyperlinks, bookmarks, history… Maximum reach, zero footprint

48 Information-based pages Rich browser application
Three Types of RIA Applications Mapping Each to an RIA Technology Choice Information-based pages Browser-based with some interactive controls No desktop integration; supports all platforms Navigational elements: Hyperlinks, bookmarks, history… Maximum reach, zero footprint Rich browser application Browser-based with desktop-like interactive controls Limited desktop integration Limited navigational elements Limited reach; some platform limitations Browser Plug-in

49 Three Types of RIA Applications Mapping Each to an RIA Technology Choice
Information-based pages Browser-based with some interactive controls No desktop integration; supports all platforms Navigational elements: Hyperlinks, bookmarks, history… Maximum reach, zero footprint Rich browser application Browser-based with desktop-like interactive controls Limited desktop integration Limited navigational elements Limited reach; some platform limitations Rich desktop application Native, highly interactive controls Full desktop integration App runs locally -Full (incremental) install over web Low reach; limited platforms Browser Plug-in Desktop RIA

50 RIA Technology Landscape
Two Types of Ajax Lightweight Ajax JavaScript libraries Heavyweight Ajax Component frameworks Browser plug-in Plug-in runtime offers rich functionality Desktop RIA Web deployment with automated updates Browser Plug-in Desktop RIA

51 RIA Technology: Lightweight Ajax
Popular choices: YUI (Yahoo) jQuery Prototype ExtJS DOJO Enhance the user experience of traditional Web pages Spot enhancements / incremental upgrade Asynchronous page updates Adds limited interactive elements Programming in JavaScript and HTML XML or JSON typically used for communication Open source libraries simplify programming complexity – over 150 Hide most browser differences UI controls , XML helper functions, XMLHttpRequest object

52 Traditional Web Architecture
Web Server Business Application HTTP(params) HTML(data)/CSS – New page Browser Server <html> /html>

53 Lightweight Ajax Architecture
Traditional Web Server Business Application HTTP(data) XML/JSON Server Browser Web Server Business Application HTTP(params) HTML(data)/CSS Browser Server <html> <body> <h1>HelloWorld </h1> </body> < /html> JavaScript event HTML/CSS/data Ajax Engine

54 RIA Technology: Heavyweight Ajax
Full web application or new UI component Framework components for client and server services Programming in JavaScript or code compiled to JavaScript Complex Ajax UI controls and custom behavior Services: Web Services and REST support Data compression / normalization Database integration Limited development tools Commercial offerings available Popular choices: Google Web Toolkit ASP.NET Ajax Isomorphic SmartClient Open Laszlo Backbase

55 Heavyweight Ajax Architecture
Lightweight Web Server Business Application HTTP(data) XML/JSON Server Browser Web Server Business Application HTTP(data) XML/JSON Server Browser function $onModuleLoad(){    var cs, i, n;    cs = $wnd.jsonData;    for (i = 0, n = cs.length; i < n; ++i) {      $wnd.alert('Hello, ' + (cs[i].FirstName + ' ' + cs[i].LastName));    }  JavaScript event HTML/CSS/data JavaScript event HTML/CSS/data Ajax Engine Framework Components Ajax Engine Server Framework Components

56 RIA Technology: Browser Plug-in
Full web application or new UI component Purposed platform specific browser plug-in – limited platform support Popular choices: Microsoft Silverlight Adobe Flex Proprietary framework and language Program in specified language Complex custom controls and custom behavior Data-binding model Extensive Web server services Compression Communication Server push Full-featured development environment with rich WYSIWYG UI designer

57 Browser Plug-in Architecture
Web Server Business Application HTTP(data) XML/JSON Server Browser function $onModuleLoad(){    var cs, i, n;    cs = $wnd.jsonData;    for (i = 0, n = cs.length; i < n; ++i) {      $wnd.alert('Hello, ' + (cs[i].FirstName + ' ' + cs[i].LastName));    }  JavaScript event HTML/CSS/data Ajax Engine Browser Plug-in Server Components

58 RIA Technology: Desktop RIA
Can be used to extend reach of existing desktop application Runs natively on desktop Full branding Provisioned over the Web Automatically installed and incrementally updated (Smart Client) Terminal services, e.g. Citrix Tight integration with the desktop Drag n’ drop Off-line mode Local storage Back-end services are platform specific Popular choices: OpenEdge GUI for .NET OpenEdge WebClient Microsoft WPF, WinForms Adobe AIR Java AWT/SWT/Swing

59 Forrester Study “Ajax is Not Enough for Power Users”

60 Matching RIA Users and Design Centers
Power User Occasional User Infrequent User Drop in deference to 16 Lightweight /Heavyweight Ajax jQuery, extJS, GWT Browser Plug-in Silverlight, Flex Desktop RIA OpenEdge GUI for .NET, OpenEdge WebClient, Adobe AIR

61 Number of User Interfaces – OpenEdge Partners May 2008

62 Percent Usage by UI Type
18%/32% Maybe get rid of 12…. Decreasing use of ChUI and OpenEdge GUI moving forward Increasing use of OpenEdge GUI for .NET and .NET Open Client WebSpeed usage stable AJAX and Browser plugins not primary. To complement/enhance Web browser UIs

63 Use Lightweight / Heavyweight Ajax for…
Easy access from “any” browser Limited interactive experience Multiple platform support Zero footprint Best for incremental changes to an existing Web application Easy update and deployment model Infrequent User Ajax Clients WITH 10.2B: Ajax client with OpenEdge WebSpeed Ajax client with OpenEdge Web Services ASP.NET with OpenEdge Open Client for .NET Java Server Pages (JSP) with OpenEdge Open Client for Java

64 Use Browser Plug-in for…
Want balance between client platform independence and a rich interactive experience Near-zero footprint; plug-ins almost ubiquitous Occasional User Browser Plug-inS WITH 10.2B: Microsoft Silverlight with OpenEdge Open Client for .NET Microsoft Silverlight with OpenEdge WebSpeed Microsoft Silverlight with OpenEdge Web Services Adobe Flex with OpenEdge Open Client for Java Adobe Flex with OpenEdge Web Services Adobe Flex with OpenEdge WebSpeed

65 Use Desktop RIA for… Limited platforms – mobility is not an issue
Tight integration with the desktop is critical Local installation allowed by IT Maximize leverage in-house OpenEdge skills Works the way you want it when you want it Power User DESKTOP RIAs WITH 10.2B: OpenEdge GUI for .NET / GUI with WebClient OpenEdge GUI for .NET / GUI /Character with Citrix or Terminal Services Microsoft WPF/WinForms with OpenEdge Open Client for .NET Adobe AIR with OpenEdge Open Client for Java

66 OpenEdge Business Application – Reach vs. Development Effort

67 UI Decision Tree

68 OpenEdge 11.0 Roadmap Lightweight / Heavyweight Ajax Browser Plug-in
JSON parser in ABL (read and write) REST Adapter to OpenEdge AppServer REST binding to OpenEdge WebSpeed Web tooling in OpenEdge Architect Browser Plug-in Microsoft Silverlight RIA Services Adapter and Proxies RIA Desktop OpenEdge GUI for .NET designer improvements Updated UltraControls

69 Summary Start with the end-user
Ajax for the infrequent user Browser plug-ins for the occasional user Desktop RIA for power users Pick the lightest-weight approach that meets your needs You might want multiple UIs Factor in the skill sets of the developers Follow the guidelines and principles of the OERA Plan for the future

70 70

71 Addressing Security and Compliance Issues
OpenEdge Transparent Data Encryption Expand list to include all initiatives that support SaaS/Cloud Get programming model right 1st. Operational model later. Fill in gap with best practices. Use this title slide or the next one. QUESTION FOR YOUR AUDIENCE: What do each of these have in common? NOTES: Speaker may pick and choose the bullets that best pertain to your presentation. Three additional optional bullets are: - Optimizing manufacturing machine utilization and production capacity while catching quality issues before they become costly - Detecting distribution bottlenecks and initiating corrective processes before they impact sales Reducing fallout in telecom order fulfillment, service delivery assurance and billing for actual usage The speaker may also chose to create other examples of operational responsiveness that are more relevant or specific to the customer’s business or industry vertical. Rob Straight – Senior Manager, Product Management

72 Introduction The Need to Provide Security for Data Continues to Increase Touches Many Market Segments: Finance, Retail, Healthcare, and more Governments Have Enacted Legislation to Enforce Compliance of Data

73 Compliance Legislation Examples
European Union Data Protection Directive Protects individuals personal information Payment Card Industry (PCI) Health Insurance Portability & Accountability Act (HIPPA) Sarbanes-Oxley Act (SOX) Public company accounting reform and investor protection “Must Have” Conformance to do Business

74 3rd-Party Encrypted SAN
Data Security Options Use Built-In Encryption Functions Encrypt Data Using O/S or SAN File Encryption 3rd-Party Encrypted SAN RDBMS encrypts only to disk, only for policy-selected data

75 Option 1: OpenEdge Built-In Encryption Functions
Requires significant rewrite and ongoing maintenance of existing code Operates on the data field level Does not encrypt the database: Poor performance- data not indexed, no range searches Limited effectiveness from a security perspective - programmers put in position of “security risk”- mistakes, oversights, dishonesty can happen Might not pass auditors review Customer has to manage the encryption keys manually SQL reports do not decrypt values

76 Option 2: Encrypt Data Using O/S or SAN File System
Performance is an issue – heavier overhead than DB encryption Microsoft says file encryption is too slow for DB Security administrators must manually track the encryption keys for anything archived Security administrators cannot prevent the writing out of clear-text data The DB and some OS utilities can write to other file systems that may not be encrypted

77 Option 3: 3rd-Party Encrypted SAN
Same issues as file system: security of the data outside the secured environment not guaranteed Backups, dumps, journal files, etc. Anything “unencrypted in memory” can be written

78 Option 4: Database Encryption At Rest
The solution chosen by most database vendors Industry expectations are “encryption at rest” because the major database vendors have proven this approach is performant, and less hassle than encrypting file systems. Carl G. Olofson, IDC Analyst for Databases

79 Why Database Encryption?

80 Encryption – Industry View: Management

81 OpenEdge 10.2B Transparent Data Encryption
Option for Enterprise Database: At-Rest (storage area level) Encryption Data secure on-disk, backup, and dump Data is unencrypted In-Memory = (up to) normal speed Secure Key Store and Key Management Change keys on-line Policies control use of utilities Industry standard encryptions AES, DES, triple DES, etc. No application changes!

82 A High-Level View of Encryption
Client <SSL> Server Database on Disk Encrypted Messages Shared Memory Backups Dump/Load Encrypted Data

83 OpenEdge Transparent Data Encryption
Protects Data in DB Tables & Indexes (block-level) Type I storage areas in their entirety Type II storage areas – on a per-table and per-index basis Full Protection Throughout the Data Lifecycle On disk, backups, binary dumps Industry standard cipher algorithms AES, DES, triple DES, etc. Clear-Text Access for Authenticated Clients No performance degradation for in-memory operations Secure, Separate Encryption Key “Store” Performance: ~5% in a typical OLTP application Three requirements with data encryption are that it be transparent, configurable, and secure. These must be part of a data encryption implementation for it to be viable. Transparent data encryption means that all data encryption is performed at run-time by the OpenEdge RDBMS, without any physical changes to ABL or SQL application code or database design. Application code executes without being aware of whether the database is or is not encrypting its data. What ABL or SQL application code could execute before the Database Encryption feature was configured can be executed after the Database Encryption feature is configured. As is. Configurable data encryption allows you to balance the database encryption and administration workload against individual security requirements. The database encryption feature allows the DBA to configure encryption for just those database objects that require it. In this way OpenEdge can protect sensitive data at the lowest possible cost. Secure data encryption is that once the OpenEdge database encrypts data, it remains inaccessible to all except to those what have legitimate access to it. To accomplish this goal, OpenEdge database will institute the necessary layers of security at all points where the data is stored and retrieved. Data Storage Security File level data encryption deters intruders who have access to the encrypted data files but do not have the data encryption keys. This section outlines the locations where private data may be encrypted and how the encryption technologies are used: TDE allows you to configure data encryption per database storage object. The list of database objects that support TDE are: Type I storage-area (tables, LOBs, and indexes, inclusive) Type II storage area tables (including Audit data tables) indexes (including Audit data indexes) LOBs AI notes files BI notes files Each TDE database has a single, unique, Database Master Key (DMK) key that is created and managed by the DBA. The uniqueness of the DMK ensures that the data encryption keys are different from any other TDE database, and if one database’s DMK is cracked it cannot be used in attacks on any other database The TDE database’s objects are encrypted using virtual data encryption keys that OpenEdge derives from the database’s DMK. Virtual encryption keys are created, used, and destroyed on demand by OpenEdge and do not require DBA administration. They ensure that each object’s data encryption key is unique within the database, and should one object’s encryption key be cracked it cannot be used to decrypt any other database object The encryption cipher algorithms and encryption key sizes that may be configured for the DMK, and individual database objects are AES encryption with key sizes 128, 192, or 256 bits DES-EDE encryption with a key size of 168 bits The DES encryption with a key size of 56 bits The DES-PBE encryption with a key size of 56 bits that is generated from a DBA supplied passphrase that is passed through a PKCS#5 v1.5 algorithm Note: Can only be used for a DMK The RC4 encryption with a key size of 128 bits TDE’s data encryption will automatically be carried into these locations Probkup file sets After image hot-standby databases OpenEdge Replication targets TDE allows you to optionally encrypt intermediate data transfer files Binary dump/load Audit archive/load TDE will not allow you to encrypt any table or index in the meta-schema area (#6). The same restriction applies to the database security policy area (described later) ABL and OpenEdge SQL server database clients will obfuscate the temporary file storage of private data when one or more of their database connections has the TDE feature enabled Those temporary files will be forcibly removed when the 10.2B_ OpenEdge client process exits. NOTE: pre 10.2B ABL clients will not have this ability and your private data is a risk You cannot connect an TDE enabled database to process whose startup options include retention of its temporary file storage (i.e. the –t option)

84 *Graphical data is relative
Your Cipher Choice Governance Business rules Your choice, your responsibility - balance strength & performance 10 RC4-128 AES-128 AES-192 AES-256 DES-56/PBE DES3-168 Performance Cost 0 – no encryption RC4-128 AES-128 AES-192 AES-256 DES-56 DES3-168 Security Strength 0 – no encryption DES-PBE 10 *Graphical data is relative

85 Database Key Store Independent and Secure Entity
OpenEdge 10.2B Product Readiness Progress Software Corporation Internal Use Only December 2009 Database Key Store Independent and Secure Entity Not part of the database One created for each transparent data encryption database Stores DB master key (DMK) external from the DB Each TDE-enabled database has one unique DMK: only one database is accessible if the DMK is compromised Managed by the DB Administrator Each database object has one or more unique virtual data encryption keys Generated by the key store service based on the DMK- no DBA action required If key is cracked, intruder only has access to that one database object A database key store is an independent and secure entity that provides secure storage of data encryption keys and controls access in the form of user accounts. The database key store is used to store the Database Master Key (DMK) externally from the database. There is one database key store created for each database that is enabled for transparent data encryption. To open a transparent database encryption-enabled database requires that the correct key store passphrase is provided. Each database object that is encrypted in a transparent data encryption-enable database is encrypted using one or more virtual data encryption keys. Virtual encryption keys are created, used, and destroyed on demand by OpenEdge and do not require any action by a DBA. The key store server derives virtual data encryption keys from the database’s Database Master Key along with other information. The use of these keys ensures that each object’s data encryption keys are unique within the database. The advantage of them being unique is that should one database object’s encryption key be cracked it cannot be used to decrypt any other database objects.

86 Challenges Addressed by TDE
Going back to the list of challenges users face with database encryption, you can see that the features of OpenEdge Transparent Data Encryption address each of these challenges.

87 How Fiserv Makes Progress - Case Study
Benefits TDE will ensure data privacy across the entire lifecycle Maintain competitive advantage and ability to interface with third parties by adhering to PCI DSS Increased IT performance will save time and reduce costs “We always try to improve our performance and get things to run faster. We tested a fully encrypted database and there was only a 4% decrease in performance versus an unencrypted database. We tested that with alternative data pools, we actually gained back almost 2% of that initial performance degradation. We believe with additional fine tuning the performance will continue to improve.”

88 Why Use OpenEdge Transparent Data Encryption?
OpenEdge 10.2B Product Readiness Progress Software Corporation Internal Use Only December 2009 Why Use OpenEdge Transparent Data Encryption? Gives You Control Over Who Can Access Private Data Works regardless of who has a copy of the data or where the data resides Easy To Implement Low Cost Solution Configurable Transparent No need to change your OpenEdge application, database design, or data There are many products available in the market place that provide encryption for ‘data at rest’, including most primary database vendors as well as some 3rd party security products. The use of OpenEdge Transparent Data Encryption is a smart choice to satisfy your need to secure data at rest. OpenEdge Transparent Data Encryption offers a relatively low cost solution that is easy to implement. The security environments that a transparent data encryption database must run in can vary. Therefore, transparent data encryption is configurable, allowing you to balance your database’s encryption performance and administration workload against your security requirements. You can configure encryption for just the database objects that require it and adjust the level of encryption security to only what is necessary to be compliant with regulations. Care has been taken in the design of OpenEdge Transparent Data Encryption to allow it to be implemented without the need for you to become an expert in designing or implementing encryption technologies. The encryption is transparent to the user and it does not require any changes to existing ABL or SQL applications in order to take advantage of encryption. In addition, you do not need to become an expert in designing and implementing encryption technologies to configure and use this feature. Using it can be as simple as enabling and configuring the feature, migrating your unencrypted data, and then resuming your normal production operations.

89 89

90 Maximize Your OpenEdge Investment with Actional Transaction Management
Mike Ormerod– Architect, SaaS and Cloud Computing Strategy

91 Why are we here? With the growing complexities of today’s infrastructure, you need end-to-end visibility that optimizes the value of each transaction …

92 Lost in interconnected complexity Find your way … the easy way
Lost in interconnected complexity Find your way … the easy way! (And get a map!) In front of you is a map of the London underground, the subway, so this is an analogy that I like to use when talking about end-to-end visibility in a distributed environment. The different color line are actually metro lines that you can compare to business processes within your infrastructure. Metro lines that allow you to get to point A to B in the city of London. The dots that you see are metro stations which serve one or multiple business processes in this case metro line so each station potentially has multiple lines running through it or multiple ways of getting through the city. Shared in different metro lines, so stations are transaction points and metro lines are business processes. You see that this is quite a complex environment, there are lots of stations, there are a lot of business processes, often many different ways a specific transaction point/station can be used/consumed. With complex, distributed environment of which OpenEdge applications are but one piece of the complete puzzle you need a way to get visibility into each service, database, middleware, applications, how each piece is being used by which process and in which context. What you need is a map of your architecture like you see here for the London underground. Today what we would like to show you is how you can get that map, and get that transaction visibility ……..

93 Unravel the Complexity
OpenEdge-based applications are one piece of the complete picture. Ensure the success of every important business transaction

94 Business Transaction Assurance: New levels of Visibility and Management
Expanding the boundaries beyond OpenEdge applications with: …the ability to capture and track all transactions automatically and continuously …the ability quickly and easily pin-point issues through root cause analysis …the ability to produce the best business outcomes with real-time process optimization

95 Why is it so important? Visibility into customer experience Assure no process steps are missed or lost Early detection of performance and availability issues Guarantee of SLAs Decreased time and resources to fix issues

96 Without Visibility and Management
Without Visibility and Management Customer Satisfaction/Reputation Impact “Verizon's servers [for BB Storm] seemingly meeting the same fate as AT&T's and Apple's on iPhone 3G launch day” “Computer glitch causes massive United flight delays” “Customers report major outage”

97 Contributing Factors Leading to Failures
Market Survey Stats Reveal Combined Effects “Growth in the volume of transactions has increased transaction failures in 70% of companies surveyed.” “Companies surveyed lost between $11 – 16M in revenue per year due to transaction failures” “On average 90% of these companies stated it takes approx 2 hours & 10 employees to address each lost order” Slide Objective: A combination of the challenges mentioned on the previous slide and their combined effects. Here’s some hard data gathered in a Market survey by” Vanson Bourne” . Survey was taken in March of 2009 and includes over 200 companies from eight countries. Results from the Vanson Bourne Market Survey

98 A Spectrum of Visibility
Where do you fit today? And, where do you need to be in the future? Zero Visibility Complete Visibility 98

99 Example One – Scenario Desired State: More Configuration capabilities
Minimal visibility into environment Non-mission critical application Application outages Minimal Revenue Loss Acceptable Data Loss Desired State: More Configuration capabilities Maintain Status Quo No Business Requirement for additional monitoring Process level information Single tool for configuration and management OpenEdge Explorer 99

100 OE10.2A - OpenEdge Explorer!
Configure Your OpenEdge Environment from Your Browser Progress Explorer OpenEdge Explorer using common OpenEdge Management framework: Browser-based interface means: No more Windows dependency Access from anywhere Single tool for configuration and management More functionality, e.g. Log viewer List AppServer connections Customizable user roles Process system level information OpenEdge Explorer You get OpenEdge Explorer if under maintenance, without OpenEdge Management functionality enabled. Both support all the OpenEdge resources that were previously supported by Progress Explorer OpenEdge Explorer will support Windows Server 2008 OpenEdge Explorer will operate on all OpenEdge supported platforms (except SCO Unix Ware) Progress Explorer will work with ….see FAQ about service pack release It means being able to monitor individual processes that make up an AppServer or Database server relative to various system metrics like CPU, memory, etc.  That can not be done with Progress Explorer.  100

101 Example Two - Scenario Desired State: Operational Continuity
OpenEdge Application Mission Critical Business Transaction with other Applications Application Outage Potential Revenue Loss Business Reputation would suffer Desired State: Operational Continuity Visibility into Application Environment Specific Business Transactions Users need application availability OpenEdge Management

102 Operational Continuity
OpenEdge Management Operational Continuity Minimal Planned Downtime Online utilities Minimum care and feeding Auto Defrag Load Balancing App Servers Non-stop Execution Failover clusters (in the box) AppServer failover See situations before they become problems Automatically adjust settings as needed Maximize uptime and operational efficiency Further reduce Progress’ already low cost of ownership. Proactive Management Both OE Explorer and OE Management continue to manage the following resources: AppServer Database Name Server WebSpeed Transaction Server New resources that can be managed by both OE Explorer and OE Management: AppServer Internet Adapter (AIA) DataServer for ODBC DataServer for Oracle DataServer for SQL Server SonicMQ Adapter WebSpeed Messenger Web Services Adapter

103 Example Three - Scenario Desired State: End-to-End Visibility
OpenEdge Application Mission Critical Business Transactions integrate with other mission critical applications Application Outage Potential Revenue Loss Business Reputation Suffers Desired State: End-to-End Visibility Visibility into Application Environment Entire Business Transaction flows Guaranteed application availability SLA’s are becoming critical Progress Actional

104 Introducing Actional For OpenEdge
Interceptors for AppServer, Sonic Adapters, WebSpeed, and Web Services Easily configure with OpenEdge Explorer No application changes required

105 Before Actional There are no painted lines on the data center floor! Finance Inventorymgmt PartnerGW CustomerGW OrderMgmt warehouseemea This represents a typical distributed enterprise where there are multiple environments, app servers, databases, platforms, middleware and more throughout the enterprise. A complex environment with no clear map detailing relationships, dependencies, no visibility at all. OrderIQ Logistics

106 Actional Enterprise Step 1: Install Actional Agents on Key Services Finance Inventorymgmt PartnerGW CustomerGW OrderMgmt warehouseemea With Actional agents are installed on platforms within the enterprise, although a system can still be managed without installing an agent, if it is one hop away from a managed platform. What’s important to note is that neither installation nor operation of the agent requires making changes to the application. Because of this applications in production can easily and quickly be taken under management, a key benefit and differentiator with Actional. Actional provides visibility and control to a breadth of platforms, BPM, ESBs, Middleware from Jboss to Tomcat, BEA Weblogic, IBM WebSphere, Reactivity, X-Broker, Artix, Lombardi Teamworks and more. Interceptors for AppServer, Sonic Adapters, WebSpeed, and Web Services Easily configure with OpenEdge Explorer No application changes required OrderIQ Logistics Actional Agents add less than 5% overhead even under the most stressful situations

107 Actional Enterprise Step 2: Let the Application Run
Once agents are installed the managed nodes then report back to the server (using SOAP over HTTP(s) or JMS) at regular, configurable intervals, providing statistics and any newly discovered services, consumers, and relationships. The server creates a holistic view base on their information. The holistic view encompasses all consumers, services, relationships, and protocols. Actional automatically discovers process flows and maps dependencies end-to-end with no custom coding or configuration

108 Actional Enterprise Step 3: Define Policies
With Actional, a policy lets you apply sets of rules to enforce certain behaviors consistently throughout your network. For example, if you supply a service with an SLA that specifies a maximum response time of 200 milliseconds, you can create a policy that sends you a warming if the response time reaches 1500 milliseconds an that issues an alarm if the response time reaches milliseconds. The policy notifies you when performance starts to degrade, letting yon take action before the SLA is violated. Auditing, service levels, detecting missed deadlines, lost transactions, … 108 108

109 Actional Enterprise Step 4: Triage and Locate Issues
As messages flow through the network, policies are evaluated at the managed platform. When a policy violation occurs, the agent notifies the server, and when required, the server “requests” the agents in the network for additional information related to the specific policy violation allowing the server to render a flow map of the complete transaction with supporting data for complete drill-down to the root cause of the issue. Actional can snapshot individual transactions that violate policies to easily isolate the root cause of problems… with no added overhead

110 Business Transaction Assurance: Why Progress?
Patented track-and-trace Do you know where your transactions are? Auto discovery  No surprises End-to-end  No blind spots Content visibility  Business aware Hippocratic Oath: First do no harm The cure is usually worse than the disease What’s critical to the success of BTA is providing automatic discover, end-to-end visibility and content relevance to the business with a solution that does not do adverse harm. In other words if at the end of the day the solution you apply requires significant resources both from a hardware and human intervention perspective then you could be doing more harm than good. If the solution you apply ends up bring the application it’s managing to it’s knees and degrades the performance of the application then the solution is truly worse than the original problem. Another area of concern is being able to deploy the full management feature set into production without effecting performance. After all what good is the product if you can’t benefit from full management while in production! The cure is not worse than the disease Track-and-trace  No manual correlation Online configuration  No downtime Minimal overhead  Always on

111 Forrester Consulting - Commissioned ROI Analysis
208% ROI achieved in less than 12 months at a leading Financial Services Organization” “Actional cuts the number of people required to fix a problem in production was reduced by 85%” “Amount of time needed to resolved a problem in preproduction was reduced by 70%” Slide Objective – Establish Actional as a “Need to have” solution with proven ROI at two Actional customers – a leading Financial Services organization and a Leading Communications Provider. Details of the Commissioned Analysis The analysis was based on Forrester’s TEI (Total Economic Impact) methodology. TEI™ is a customizable and practical methodology to assess a realistic and risk-adjusted ROI that fully values the benefits and flexibility of a given technology solution Forrester conducted a series of in-depth interviews with two organizations currently using Progress Actional’s solution. For each case study, Forrester constructed a financial model representing the customer’s experience with Progress Actional. Customer 1 -Large US-based private financial service company Customer Situation Progress Actional deployed to production, quality assurance, and performance testing environments 400+ service operations across CRM and servicing application environments Customer Profile 2 - Large US-based communication and media service provider Current Adoption Progress Actional deployed to production and quality assurance environments Layered service environment, with hundreds of service operations spread across a dozen applications PLUS…………………. Reduction in development time required for service monitoring Reduction in time required for weekly reporting Reduction in the number of production incidents Increased revenue as a result of reduced application downtime

112 A Spectrum of Visibility
What tools are available to help you? Existing Out of the Box Tools OpenEdge Management Progress Actional 112

113 High Performant, Scalable, Patented, Product Leader, Proven ROI
Summary High Performant, Scalable, Patented, Product Leader, Proven ROI End-to-end Visibility to monitor and govern services and applications Design-time to run-time application validation, visibility and control Ensure the success of every important business transaction

114 114

115 Save the date for EMEA PUG Challenge 2010!
first joint conference of all European Progress Users Groups November 18 & 19 (Thursday/Friday), Cologne/Germany 2 days fully packed with technical and business oriented sessions and workshops, mini expo for tools 5 parallel tracks on OpenEdge and Progress Software Integration Technologies top-class international speakers from Progress Software and independent organizations social evening event / dinner party on Thursday for more details!


Download ppt "Face2Face Forum – Netherlands"

Similar presentations

Ads by Google