Directories, Databases and Decisions A CTO’s view of Enterprise Management Solutions.

Slides:



Advertisements
Similar presentations
Preserving and Sharing Digital Data Greg Colati, Director, Archives and Special Collections May 11, 2012.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
ICS 434 Advanced Database Systems
The CA MDB Revised May © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced.
CA's Management Database (MDB): The EITM Foundation -WO108SN.
Cloud Computing: Theirs, Mine and Ours Belinda G. Watkins, VP EIS - Network Computing FedEx Services March 11, 2011.
4/15/2017 5:36 AM 1 © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Active Directory: Final Solution to Enterprise System Integration
Managing Data Resources
Replication of an X.500 Directory Service to Microsoft’s Active Directory.
SaaS, PaaS & TaaS By: Raza Usmani
Module – 7 network-attached storage (NAS)
You’ve Built The Pieces, Now Integrate Your Enterprise! Mid-Atlantic Regional Conference January 17, 2003 Patty Gertz, Princeton University
David Besemer, CTO On Demand Data Integration with Data Virtualization.
Dynamics AX Technical Overview Application Architecture Dynamics AX Technical Overview.
Public Key Infrastructure from the Most Trusted Name in e-Security.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
MIS 710 Module 0 Database fundamentals Arijit Sengupta.
Exploring Directory Services. Need for DS Multiple servers, multiple services in single network –Multiple servers for reliability, security, optimizing.
ENTERPRISE DATA INTEGRATION APPLICATION ARCHITECTURE COMMITTEE OCTOBER 8, Year Strategic Initiatives.
Word Wide Cache Distributed Caching for the Distributed Enterprise.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
Novera Software, Inc The Leader in Java Application Servers.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
CSC271 Database Systems Lecture # 4.
1 ©2009 Desktone, Inc. All rights reserved. Desktops in the Cloud: It’s not Virtual Desktop Infrastructure (VDI) Danny Allan, Chief Solution Architect.
STORAGE ARCHITECTURE/ EXECUTIVE: Virtualization It’s not what you think you’re buying. John Blackman Independent Storage Consultant.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
CHAPTER 8: MANAGING DATA RESOURCES. File Organization Terms Field: group of characters that represent something Record: group of related fields File:
 Chapter 6 Architecture 1. What is Architecture?  Overall Structure of system  First Stage in Design process 2.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
19 May 2012 Extending EPM to the next level with Nintex Workflow, Nintex Forms and Nintex Live Marnus Viljoen – #SPSJHB The first.
Cloud Storage - A Paradigm Shift in IT Jim Zierick – President & CEO Nirvanix.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Oracle Application Express. Program Agenda Oracle Application Express Overview Use Cases Key Features Packaged Applications Packaging Pricing Call to.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Announcements. Data Management Chapter 12 Traditional File Approach  Structure Field  Record  File  Fixed All records have common fields, and a field.
Active Directory Overview n Course: Operating System n Professor: Mort Anvari n Student: Lina Si n Date: 09/07/02.
Requirement for Enterprise Directory Services A Customer Influenced Perspective TOG DCE Program Group ® Brian Breton Gradient Technologies, Inc.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
ARCH-08 A Common Business Service Approach to Application Development Anthony Swindells Progress Fellow.
AIRLINES REVAMP 10/29/2013. Executive Summary Business Problem: The Airlines application is primarily used to sell, distribute and collect revenues for.
Managing Enterprise GIS Geodatabases
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
1 Copyright © 2012 Tata Consultancy Services Limited Windchill Architecture.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Managing Data Resources File Organization and databases for business information systems.
The Holmes Platform and Applications
The HUB 400: enterprise force multiplier
Data Services for Service Oriented Architecture in Finance
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
System Architecture Issues
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Process Improvement Process Identification
Office 365 SharePoint Document Management and Collaboration Enhanced with Less Dev Time “By using Microsoft Azure with Office 365, Ways can focus on developing.
Public Key Infrastructure from the Most Trusted Name in e-Security
NAV In The Cloud: Exploring Options for a Cloud-based Deployment
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Presentation transcript:

Directories, Databases and Decisions A CTO’s view of Enterprise Management Solutions

DRAFT The problem Hundreds of Applications, Systems and NOS’s, all with separate management structures 10 new Major applications per year, dozens of smaller apps Time to develop and deploy shows 20% overlap per project for security and entitlement TCO is mostly tied to integration and user MAC’s Complex security relationships are difficult to centralize Ownership of the user is a political hotbutton Big Friggin’ Security Store is costly to build, costly to maintain, and promotes rogue development Cost of real time WAN infrastructure for central security store is cost prohibitive Extending RDBMS design to include all apps is fiction

DRAFT What the CTO wants Lowered cost of development for new systems Lowered TCO for individual applications, as well as the combined spend Increased external cust sat levels Increased internal cust sat and cost levels Common methodologies and technologies Easy to integrate, easy to migrate technologies Vendor integrity SHARP Ease of adoption, ease of proliferation, ease of extension Preserves existing investments Definitive TCO and ROI models Vendor skin in the game

DRAFT Traditional Ways of approaching the problem Security Bridges (proxy authentication) Client Master Files (batch replication) Authoritative Sources (parsed authorization) Administrative Policy (human rules) Single technology, multiple methods (roll you own security) Hosting (devolving the problem) Delay (put off the problem) Centralized A&A (shared service, central mgmt) Directories (shared service, distributed mgmt)

DRAFT How the problem came to be Mainframe based apps shared a common security infrastructure Security was centrally maintained by a distinct group Single interface allowed for common programming and leverage model UNIX maintained this approach using NOS based single security store Then, the dark side… Client server systems were stand alone islands of security NOS based security was limited, and not extensible Shared systems were not scalable Security bridges are not extensible Proliferation of stand alone systems forced decentralization of mgmt. Early web systems mirrored this model, but…

DRAFT The promise of Webification Ubiquitous, centralized systems that have rich interfaces w/ great ease of use Simplified programming model, w/ shared services Data stores we “oil fields” or resource, instead of “gold mines” (many wells vs. one shaft) Development of discreet services, instead of applications “Velcro” functionality, instead of distinct releases “Extreme Security” - layered and crypto-ed

DRAFT Why we’re not there yet Traditional programming models built web apps like C/S apps A&A schema’s need great extensibility Ubiquitous user store, with rich A&A info is difficult to create Complex relationships for security and entitlement do not span systems Development time and TCO are difficult to show prior to technology decision making “Shared services” mean that “someone has to own them” LOB’s rarely fund shared services CIO’s need to be evangelized Directories are costly up front, RDBMS’s are costly long term “Maximizing a directory’s potential” is still an art, not a common skill

DRAFT