1 Service Oriented Architecture: UW’s Migration Strategy a.k.a. What is it and how do we get one? Jim Phelps Sr. I.T. Architect, DoIT, UW-Madison

Slides:



Advertisements
Similar presentations
Copyright Joann Martyn, 2007.This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Advertisements

A multi-tiered storage and data protection strategy Carl Follstad Manager, University Data Mgmt Services Office of Information Technology University of.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
E-Biz Forum 2002 E-Business Forum May 16, 2002 Steve Relyea Vice Chancellor – Business Affairs University of California, San Diego.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
Serving the Research Mission: An Approach to Central IT’s Role Matthew Stock University at Buffalo.
Application Integration, Data Access, and Process Change.
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
3/20/20071 IT Strategy and Leadership in Higher Education: Two Case Studies Case 1: Roberts Wesleyan College. Presented by Pradeep (Peter) Saxena, CIO.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Enterprise Architecture at Saint Louis University Copyright 2008 Saint Louis University. This work is the intellectual property of the author. Permission.
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) EDUCAUSE Southwest Regional Conference University of.
Open Your Eyes: Open Architecture, Open Source, Open Projects Mid-Atlantic Educause January 12, 2005 Copyright Patricia Gertz This work is the intellectual.
Center for Instructional Technology James Madison University Strategies for Transitioning to the Age of Digital Media Sarah E. Cheverton James Madison.
You’ve Built The Pieces, Now Integrate Your Enterprise! Mid-Atlantic Regional Conference January 17, 2003 Patty Gertz, Princeton University
Copyright Statement Copyright William F. Hogue, This work is the intellectual property of the author. Permission is granted for this material to.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Copyright Notice Copyright Christopher G. Phillips, This work is the intellectual property of the author. Permission is granted for this material.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Lynette Olson, Assessment & Effectiveness Director & Gary Langer, Associate Vice Chancellor, Office of the Chancellor, Minnesota State Colleges and Universities.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
Educause 2006, Dallas TX What does a University need from Access Management? John Paschoud InfoSystems Engineer, LSE Library London School of Economics.
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
ENTERPRISE DATA INTEGRATION APPLICATION ARCHITECTURE COMMITTEE OCTOBER 8, Year Strategic Initiatives.
Lowering the Technology Barrier: Assigning Collaborative Web Projects Scott E. Siddall Denison University Copyright Scott E. Siddall, This work is.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Transparency, Efficiency & Accountability Why change something that works?  Drivers ◦ Government organization changes ◦ Legislative changes ◦ Compliance.
Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.
1 Introduction CSIE, Da-Yeh University. 2 History of Software Development Traditional Programming Paradigm  Behind schedule, costly, and unreliable.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Megan Adams, Swarthmore College Mark Colvson, Bryn Mawr College January 17, 2003 Collaborative Virtual Reference Services: The Tri-College Libraries’ Experience.
NERCOMP 2002 Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith University Registrar University of Connecticut.
Welcome to CAMP: Charting Your Authentication Roadmap Mike Grady Senior Technology Architect and Strategist Campus Information Technologies and Educational.
March 26, 2003The Navigo Project Hans C. Masing, The University of Michigan Lance D. Speelmon, Indiana University An IMS and OKI Compliant Open Source.
Service Oriented Architecture (SOA) at NIH Bill Jones
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Portal to the Rescue: First Year Information Copyright William P. Wilson This work is the intellectual property of the author. Permission is granted.
An Integrated Framework for Identity and Access Management (IAM) RL”Bob” Morgan, U Wash., MACE Keith Hazelton, U Wisc., MACE Internet2 Spring Member Meeting.
IT Governance: (Re-)Assembling the Packets Fred Siff Vice-President & Chief Information Officer, Professor of Information Systems University of Cincinnati.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Overview: Application Integration, Data Access, and Process Change November 16, 2005 Tom Board, NUIT.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
3.3.1 IBM Almaden Services Research © Copyright IBM Corporation All rights reserved. 1 Considerations for the Use of Methods in Services Introduction.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
Partner Toolbox Cloud Infrastructure & Management
Julian Hooker Assistant Managing Director Educause Southwest
Beth Schaefer and Mark Rank | March 16, 2010
Using Champions to Make Change Happen
Defining an IT Workflow, from Request to Support
Automating Security in the Cloud
myIS.neu.edu – presentation screen shots accompany:
Enabling Applications to Use Your IdMS
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

1 Service Oriented Architecture: UW’s Migration Strategy a.k.a. What is it and how do we get one? Jim Phelps Sr. I.T. Architect, DoIT, UW-Madison

2 What I’ll Cover Data vs. Service Three Tiers (slides included FREE!) Migration Strategy Sticky Bits Roadmap Next Steps (2 years) Summary

3 Integration is.. Complex: When systems change, interfaces need to be rebuilt Brittle: When interfaces fail, people are unhappy (and often blame the wrong people) Expensive: Garther - “up to 50% of large enterprise’s IT budget is spent on interfaces and integration” (1)

4 A Simple Use Case eReserves: Library has books on reserve for a course. The Library checks those books out only to students in the course.

5 Data vs. Service SIS Course Roster Library Course Roster Data

6 Data vs. Service Service SIS IsEnrolle d Service Library Yes/ No StudentID, CourseID SIS Cours e Roster Library Cours e Roster Data

7 Reusability Service SIS IsEnrolle d Service Libra ry Yes/ No StudentID, CourseID

8 Service SIS IsEnrolle d Service Libra ry Yes/ No StudentID, CourseID Point of Sales System Reusability

9 Service SIS IsEnrolle d Service Libra ry Yes/ No StudentID, CourseID Point of Sales System Portal StudentID CourseID Reusability

10 Service Replication of all dataPull as needed OpaqueTransparent DisconnectedConnected Point-to-PointOne-to-Many Reusable BrittleRobust Composite Apps Data

11 Data vs. Service Fundamental shift away from shipping data to providing services

12 Data vs. Service Move to SOA to: –Reduce cost –Increase security –Reduce data duplication –Gain transparency –Reusability

13 Three Tiers Lower Tier: Operations –No longer based on “here is an app that runs on this server on this hard-drive”

14 Three Tiers SAN Network App Server Lower Tier: Operations –No longer based on “here is an app that runs on this server on this hard-drive”

15 Three Tiers Network Service Compute Service Storage Service Lower Tier: Operations –No longer based on “here is an app that runs on this server on this hard-drive” SAN Network App Server

16 Middle Tier: Application Architecture –Build Applications as a suite of reusable business objects –Architecture behind Fusion Three Tiers Fusion IdM Edit Person CampusID create: first, last, middle Register

17 Middle Tier: Application Architecture –Build Applications as a suite of reusable business objects –Architecture behind Fusion Three Tiers Fusion IdM Edit Person CampusID create: first, last, middle New Hire

18 Three Tiers Top Tier: System to System Integration –Based on Web Services –Basis of interoperability between systems Service SIS IsEnrolle d Service Library Yes/ No StudentID, CourseID

19 Three Tiers Top Tier: System to System Integration –Based on Web Services –Basis of interoperability between systems Service SIS IsEnrolle d Service Library Yes/ No StudentID, CourseID Point of Sales System

20 Service SIS IsEnrolle d Service Library Yes/ No StudentID, CourseID Point of Sales System Three Tiers Top Tier: System to System Integration –Based on Web Services –Basis of interoperability between systems Portal StudentID CourseID

21 Migration Strategy - SOA Process - business process analysis Information - data definitions and standard schemas Infrastructure - architecture and technical gaps Vendors - helping hands Organization - Change Management

22 Migration Strategy - SOA Process - Business Process Analysis –Prioritization - Most Pain, Most Gain –Define/Document Business Process –Look for optimization opportunities –Use disruption to your advantage –Data needs (timeliness, availability, etc)

23 Migration Strategy - SOA Information - Enterprise Data Definitions –Let the Business Process Analysis drive the data definition process –Don’t build a complete dictionary –Start with the most needed definitions –Build on existing standards

24 Migration Strategy - SOA Infrastructure - Architecture and Technology –Gap analysis - what pieces are missing –Do we have the right architecture in place? –Business Process Analysis and Data needs drive the effort.

25 Migration Strategy - SOA Vendor - Evaluation to fill the gaps –Business Process Analysis –Enterprise Data Identification –Data Definitions / Standards Development –Service Design –Technology Gaps

26 Migration Strategy - SOA Organization - Change Management –Culture shift from data to services –Staff training and support –New Expertise Service Interface Designer (2) Service Library Manager (2) –Integration Competency Centers (3)

27 People of the ICC Project Manager Services Architect Interface Designers Registry / Library manager Schema experts

28 Migration Strategy - SOA

29 Building the ICC Critical Success Factor Centrally funded not a charge-back center Unifying practices Easier to enact and deploy standards Manage the interface library (WS Registry a.k.a. UDDI Registry)

30 Organizational Change New Skills and the ICC Forces for Change Misalignments –Funding models –Employee Evaluation

31 Who is the force for change? Service SIS IsEnrolled Service Library Yes/No StudentID,Co urseID Point of Sales System Portal StudentID CourseID1 … ? ? ? ?

32 Force 1: Architectural Purity Service SIS IsEnrolled Service Library Yes/No StudentID,Co urseID Point of Sales System Portal StudentID CourseID1 … Statement: It is good for the Enterprise. Model: We will all cooperate for the good of the whole. Never works. People don’t act for the good of all when their project / budget / timeline / comfort is at risk.

33 Force 2: Consumer Service SIS IsEnrolled Service Library Yes/No StudentID,Co urseID Point of Sales System Portal StudentID CourseID1 … Statement: We want a Web service for ….. Model: The first Consumer will drive the change. Rarely works. Need an alignment of good will between the Consumer(s) and Service Provider.

34 Force 3: Service Provider Service SIS IsEnrolled Service Library Yes/No StudentID,Co urseID Point of Sales System Portal StudentID CourseID1 … Statement: It is the new “supported” way Model: The Service Provider will set the standard Should work. Especially if the Service Provider can eliminate other feeds and if they impose costs on new feeds.

35 How would this work Service Provider eliminates multiple flat-file feeds - replaces with single Web Service.

36 How would this work Use Web Service –Agree to SLA –ICC establish Security and Policy –Register use in the WS Registry Service Provider eliminates multiple flat-file feeds - replaces with single Web Service. Consumer can:

37 How would this work Use Web Service –Agree to SLA –ICC would establish Security and Policy –Register use in the WS Registry Request a Flat File –Go through review –Pay to build & maintain feed forever –Pay for whole cost of feed –Agree to policy re:use, security, privacy etc. Service Provider eliminates multiple flat-file feeds - replaces with single Web Service. Consumer can:

38 Force 3: Service Provider Service SIS IsEnrolled Service Library Yes/No StudentID,Co urseID Point of Sales System Portal StudentID CourseID1 … Agree Or Pay $$$

39 Organizational Change New Skills and the ICC Forces for Change Misalignments –Funding models –Employee Evaluation

40 Misalignment How we fund projects How do we measure our employees

41 Misalignment How we fund projects –DATA - “please build an app for me” –SERVICE - “we need these reusable services” –Looks a lot like “Overhead”

42 Misalignment How we fund projects –DATA - “please build an app for me” –SERVICE - “we need these reusable services” –Looks a lot like “Overhead” How do we measure our employees –DATA - “I built these apps for these customers” –SERVICE - “I made these reusable services” –Hard to measure “value”

43 Organizational Change New Skills and the ICC Forces for Change Misalignments –Funding models –Employee Evaluation

44 Other Sticky Bits Standards Policy & Security Governance

45 Security/Policy Enforcement Service SIS IsEnrolled Service Library Yes/No StudentID, CourseID Two models –Embedded (written into the interfaces) –In-line (proxy) In Line Embedded

46 Phylogeny and Standards

47 Phylogeny and Standards WSDL SOAP XML WS-Security WS-Policy

48 Security/Policy Enforcement Service SIS IsEnrolled Service Library Yes/No StudentID, CourseID Two models –Embedded (written into the interfaces) –In-line (proxy) In Line Embedded

49 Governance - Complex and Difficult Mix When you hear the words: Funding, Policy, Security and Architecture in the same talk, you know that Governance can’t be far behind.

50 Governance - Complex and Difficult Mix

51 Identity Management framework Identity Management Leadership Group Registrar & H.R. co-chair Members include: Business Leaders Technical Leaders Authentication Authorization Coordinating Team Access To Data ID Card Evaluation Technical Assessment and Policy Recommendations

52 SOA Management framework SOA Leadership Group Integration Competency Center DRAFT

53 Roadmap to SOA UW System HighwayBusiness Application HighwayCampus Highway

54 Roadmap to SOA ’ view UW System Highway Integration Competency Center (ICC) Registry Establish Governance Development Standards Common Tools

55 Roadmap to SOA ’ view Analysis of Interfaces Analysis of the Business Processes Reduce the number of Interfaces Apply standard data definitions (schemas) Migration to Services Business Application Highway

56 Campus Highway Roadmap to SOA ’ view ICC or ICC Partners Establishment of Governance Analysis of Business Processes Reduction of Interfaces Migration to Services

57 Next 2 Years Analysis of Interfaces –Document the interface and business process –Starting with “Course Roster” Look to refactor interfaces Reduce the number of interfaces Use standards for data representation (IMS) Request Official University Transcripts Electronically (ROUTE) –Expose two interfaces as Web Services (Student Bio-Demo and Holds/Fines)

58 Next 2 Years - D2L Interfaces Refactoring the Grading Interfaces –Opportunity to make changes –Use disruption - Look for opportunities Refactor the Course Roster interface –Already using standards for data representation (IMS)

59 Building the ICC Critical Success Factor Looking at building an ICC Report to a Deputy CIO Service Team model (includes members from groups working on Web Services) –Middleware –Applications Development –Others

60 Conclusion Why SOA/Web Services? –Reduce the cost of maintaining interfaces. –Buffer systems from changes. –Protect data. Provide Security. –Transparency. –Enforcement of business rules (FERPA). This means Security, Governance and Policy

61 Conclusion ICC is critical. –Must be seen and helpful not an extra cost and burden to projects. Governance, Policy and Security are sticky issues We have opportunities in front of us right now (D2L, PS8.9, etc) The door has opened for SOA.

62 References 1. Enterprise Application Integration, Revere Group Presentation - June 26, Service-Oriented Architecture, A Field Guide to Integrating XML and Web Services, Thomas Erl - Prentice Hall 3. Introduction to Integration Compentency Centers, Darwinmag.com Enterprise Service Bus, David A. Chappell - O’Reilly 5. VantagePoint SOA Reality Check, Anne Thomas Manes, Burton Group

63 Thank you. Questions? SOA - UW’s Migration Strategy a.k.a. What is it and how do we get one? Jim Phelps, Sr. I.T. Architect, DoIT, UW-Madison EDUCAUSE MWRC06, March Copyright Jim Phelps, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.