Business Goal-Driven Optimization of Business Process in EERP James Wei Guo, eBridge China Symon Chang, BEA Systems Inc. April 29, 2008 Copyright © 2008.

Slides:



Advertisements
Similar presentations
Web Service Architecture
Advertisements

Reliability on Web Services Presented by Pat Chan 17/10/2005.
A Successful RHIO Implementation
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WS-Security TC Christopher Kaler Kelvin Lawrence.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
SOA with Progress Philipp Walther Consultant. © 2007 Progress Software Corporation2 Agenda  SOA  Enterprise Service Bus (ESB)  The Progress SOA Portfolio.
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
SOA Best Practices INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
CSC-8530: Distributed Systems Christopher Salembier 28-Oct-2009.
Web Services Andrea Miller Ryan Armstrong Alex. Web services are an emerging technology that offer a solution for providing a common collaborative architecture.
WS-PolicyNegotiate A Web Service Standard for Policy Negotiation by Nicholis Bufmack.
Introduction to Management Information Systems Chapter 8 E-Commerce and Supply Chain Management HTM 304 Fall 07.
Peoplesoft: Building and Consuming Web Services
GFIPM Web Services Concept and Normative Standards GFIPM Delivery Team Meeting November 2011.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Ron Vardinon Regional Manager – Israel HRG Universal Super Platform PNMsoft SEQUENCE & Microsoft BizTalk
Web Service Standards, Security & Management Chris Peiris
Web Services and HL7v3 in IHE profiles Vassil Peytchev Epic.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
A Microsoft Perspective Kirby Bartholomew Product Manager Application Platform & Developer Marketing
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Web Services: An Introduction Al Kassam Briyante Software Corp
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
OiCoN 2007Madeira Island Automotive Industry Action Group (AIAG)  Automotive Industry ‘Vertical’ for North American Supply Chain Founded by.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
EERP service portal -design guidance- Copyright © 2008 Beijing eBridgeChina Ltd Andy Lee Chief Scientist Beijing eBridge China Ltd.
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
Identifying Web Service Integration Challenges Frank Goethals SAP-Research Chair on ‘Extended Enterprise Infrastructures’ K.U.Leuven – Belgium
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
Random Logic l Forum.NET l Web Services Enhancements for Microsoft.NET (WSE) Forum.NET ● October 4th, 2006.
Navigating the Standards Landscape Andrew Owen SEARCH.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
1 Introduction to Web Services Quality Model And Collaboration Issues for EERP Sojung Kim WSQM TC National Information society Agency.
1 UNIT –II Architecting Web Service. 2 Why SOA? – business point of view  Information Technology (IT) workers face many challenges, including: Limited.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
8 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
© 2007 IBM Corporation IBM Information Management Accelerate information on demand with dynamic warehousing April 2007.
Web Service Future CS409 Application Services Even Semester 2007.
Grid Authorization Landscape and Futures Von Welch NCSA
Independent Insight for Service Oriented Practice Summary: Service Reference Architecture and Planning David Sprott.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Gridshell Security Master Project Akylbek Zhumabayev Rochester Institute of Technology.
Using WS-I to Build Secure Applications Anthony Nadalin Web Services Interoperability Organization (WS-I) Copyright 2008, WS-I, Inc. All rights reserved.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
April, 2005 ebSOA Based on FERA Reference Model Vasco Drecun Collaborative Product Development Associates, LLC Goran Zugic ebXMLsoft Inc.
Wednesday, 3:30 PM – 5:00 PM Telecom SOA Profile  WS Addressing  WS reliable messaging  WS security  SOAP over JMS  General improvement of specs with.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
By Jeremy Burdette & Daniel Gottlieb. It is an architecture It is not a technology May not fit all businesses “Service” doesn’t mean Web Service It is.
Florida Atlantic University Department of Electrical and Computer Engineering &Computer Science ( ECECS ) &Computer Science ( ECECS ) Security Systems.
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
e-Business and Supply Chain Management
WEB SERVICES.
Information Systems: Concepts and Management
E-BUSINESS E-Business is the powerful business environment that is
Presentation transcript:

Business Goal-Driven Optimization of Business Process in EERP James Wei Guo, eBridge China Symon Chang, BEA Systems Inc. April 29, 2008 Copyright © 2008 Beijing eBridgeChina Ltd

Outline n Introduction of EERP n What is the Business Goal? n How to Optimize to Reach the Goal? n Information needed n Q & A

At the Beginning of the Day n Opportunities! n Possibilities! XML SOAP WSDL UDDI WSS WSRM WS-SX WSA MTOM SOA Web Services

At the End of the Day n Results! n Profits! ROI TCO SLA QoS

And Everything in Between n Planning n Execution End-to-End Resource Planning Scalability Interoperability Manageability Performance Reliability Availability Security Collaboration: customers suppliers partners competitors People Applications Systems Facilities

What is EERP? n End-to-End Resource Planning (EERP) is a business-centric approach to end-to-end integration and optimization of business processes and services to increase business agility and adaptability to ever-changing environment, improve business performance, sustain competitive advantage, and ultimately create business value and accomplish the business objective. Business-Centric Optimization! For Business Value

Sample Business Processing Flow n Multi-step n Multi-party n Multi-hop Bank Accounts Receivable Mail Check Authorizer Requisitioner Procurement Invoice Ship Receive Accounts Payable & Change Order Supplier Purchase Order & Change Order Acknowledgment Gather Reqs Source Contract Catalog Search Analysis NegotiateAnalyzeReconcile It is not just simple request and response! End-to-End is beyond point-to-point collaboration between Web Services.

End to End Web Services Environment n Central and distributed registries of software components n Distributed deployment n Cross Internet n Access from multiple devices n Multiple users Multiple hops Multiple steps Multiple alternatives Characteristics of the Environment:

Combination of Multiple Alternatives n A simple WS-Policy representation of alternatives: n This is four alternatives n In the end-to-end multi-hops, multi-steps and multi-parties environment, the combination of multi-alternatives can result into hundreds to thousands alternatives  Is equivalent to

The Challenge -- Optimization n Multiple parties Multiple hops Multiple steps Multiple alternatives How to find the best solution in: How to select the best alternative? Business Goal-Driven Optimization Requires dynamic end-to-end integration and optimization across value chains.

At the End of the Day n We have many standards for Web Services now n The question is: Where is the BEEF? WS-* standards SOAP 1.1 WS-Security 1.0 WS-Addressing 0.8 WS-Policy 1.2 WS-Reliable Messaging 1.0 WS-Trust 1.0 WS-Secure Conversation 1.2 SOAP 1.2 WS-Addressing 1.0 WS-Reliable Messaging 1.1 WS-Policy 1.5 WS-Security 1.1 SAML 1.1 SAML 2.0 WS-Secure Conversation 1.3 WSS SAML 1.1 Token Profile 1.0 WS-Trust 1.3 WS-Security Policy pre 1.2 WS-Security Policy 1.2 WSS SAML 1.1 Token Profile 1.1 WSS SAML 2.0 Token Profile 1.1

What is the BEEF? n BEEF – Benefits of End-to-End Functions n It is the Business Goal n At the end of day, the Business really want is: Faster, Better and Cheaper Faster, Better and Cheaper l Performance l Price l Quality of Service Time-to-Market Cost/Profits Features and Services Resource Utilization Availability Time Money Quality

How to Maximize the BEEF? n The question is: n In the multi-hops, multi-parties, multi-steps, and multi-alternatives end-to-end business process environment n How to optimize to get maximum benefits? Faster Better Cheaper

Optimization of WS-SecurityPolicy n Let’s use WS-SecurityPolicy from WS-SX TC for example n The TC defines many security policy assertions n These policy assertions group together become policy alternatives n There are many policy examples documented n For the end user, which policy to be used is a big challenge

Which policy alternative to use? n There are many policies, and user can define even more policies. Which policy should be used? n Depending on user requirements and preference l Performance -- heavy vs. light transaction load l Security -- low vs. high security requirements l Interoperability -- do we need to support different versions? l Credential Availability -- X509 vs. Username Token, clear vs. digest password Performance Security Availability Interoperability

Methodology in EERP n End-to-End is beyond point-to-point collaboration between Web Services. n Resource Planning helps to reasonably distribute resources, e.g. people, application, system, etc by business rules (knowledge).

Business Goal-Driven Optimization n In EERP, to reach maximum benefits, we need the following: l “Where” is the BEEF l “When” is the BEEF l “What” is the BEEF l “How much” is the BEEF

“Where” is the BEEF n The location is an important element in End-to-End Resource Planning n Different places process may cost differently and get different results n The service need to have location elements: l Logic location -- WS-Addressing l Physical location -- Geo-coding, i.e. latitude/longitude

“When” is the BEEF n The time is an important element in the End- to-End Resource Planning n The service need to have time elements n Different time may cost differently n Time include both: available time and duration l Availability calendar l Throughput

“What” is the BEEF n What kind of Service, or what is the quality of the service are important elements, too n Need to standardize the following: l EERP-Rating n Reputation-based n Historic data for rating l EERP-Quality n Describe industry service quality through standardized way

“How much” is the BEEF n How much refers to the cost or price of the services n What is the cost/price of the service is an important elements, too l Unit l Amount l Currency n Need to have standard way to track the cost of each services

Optimize on Where, When, What and How Much n End-to-End Resource Planning n With the information of location, time, service quality and cost, the Goal of Optimization can be reached Multi-hop, multi-step, multi-user, and Multi-alternatives Analysis Modeling Operation EERP-RATING EERP-QOS EERP-SLA Preference: Fast Better Cheaper WS-* SOA BPM Semantics

Questions?