1. 2 Mike Giovinazzo Director, ESD Enabling ESD in a complex enterprise to a diversified market Enabling ESD in a complex enterprise to a diversified.

Post on 14-Dec-2015

218 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

Transcript

1

2

Mike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESD

Enabling ESD Enabling ESD in a complex enterprisein a complex enterpriseto a diversified marketto a diversified market

Enabling ESD Enabling ESD in a complex enterprisein a complex enterpriseto a diversified marketto a diversified market

ECC Symposium 2000ECC Symposium 2000

3

4.

Supply Line Integration

3.Legacy

Integration

Evolution of Web Presence Evolution of Web Presence

2.

Limited Web Transactions Complexity

Val

ue

1. Web Site

4

What’s Different ?What’s Different ?

E-business = Traditional IT + Internet Open Architecture

(rather than proprietary tools, formats, networks) Browser Front End

(emphasis on GUI, hyperlinks, multimedia)

Omnipresent technology(easier software rollout and greater accessibility, increased security risks)

Frantic Evolution(constant learning, immature technology)

E-business = Traditional IT + Internet Open Architecture

(rather than proprietary tools, formats, networks) Browser Front End

(emphasis on GUI, hyperlinks, multimedia)

Omnipresent technology(easier software rollout and greater accessibility, increased security risks)

Frantic Evolution(constant learning, immature technology)

5

Where Companies are FocusedWhere Companies are Focused

Source: InformationWeek Researchsurvey of 300 IT executives

Web development toolsNetwork security

Web server softwareApplication integration technologies

Data warehousingElectronic-commerce software

Extranets or supply chainsOLAP

ERP package or modules

Web to legacy tools

20 40 60 80 100

% of IT respondents

6

Government FocusGovernment Focus

“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”

“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”

Government On-line Initiative Government On-line Initiative Government On-line Initiative Government On-line Initiative

7

Government On-line: ObjectivesGovernment On-line: Objectives

Improve services to Canadians

Increased Efficiency and cost reduction

Create a government for 21st Century

Serve as catalyst for EC

Improve services to Canadians

Increased Efficiency and cost reduction

Create a government for 21st Century

Serve as catalyst for EC

8

Government On-line: TargetsGovernment On-line: Targets

Dec. 31, 2000 - On-line presence

Dec. 31, 2002 - 50% of key services EC enabled

Dec. 31, 2004 - 100% of key services EC enabled

Dec. 31, 2000 - On-line presence

Dec. 31, 2002 - 50% of key services EC enabled

Dec. 31, 2004 - 100% of key services EC enabled

9

Government On-line: 8 Point StrategyGovernment On-line: 8 Point Strategy

Vision Targets Leadership Incentives Investment Partnerships Infrastructure Branding/Marketing

Vision Targets Leadership Incentives Investment Partnerships Infrastructure Branding/Marketing

10

Relevant, TimelyRelevant, TimelyAccessible Services Accessible Services

Responding toResponding toIndividual, Business Individual, Business

and and Community NeedsCommunity Needs

5 Applications (year 1):5 Applications (year 1):•EI EI •Record of Employment Record of Employment •Electronic tax filing Electronic tax filing •E- Procurement & SettlementE- Procurement & Settlement•Secure messagingSecure messaging

Citizen /BusinessCitizen /BusinessMapMap

Federal Federal DepartmentsDepartments

ProvinciaProvincial l MinistrieMinistriess

Municipal Municipal DepartmentDepartmentss

Non-Profit Non-Profit AgenciesAgencies

Private Private Sector Sector OrganizationOrganizationss

InfoInfo Transactions Transactions

PKI

Access OptionsAccess Options

SecureSecureConnectionConnection

Government On-line: Enabling InfrastructuresGovernment On-line: Enabling Infrastructures

11

DepartmentUnique

Components

DepartmentUnique

Components

DepartmentUnique

Components DepartmentUnique

Components

Department Shared Components

Government-wide Components

FederatedFederated ArchitectureArchitecture

DepartmentDepartment ArchitecturesArchitectures

BusinessBusinessProcessProcess

BusinessBusinessProcessProcess

BusinessBusinessProcessProcess

BusinessBusinessProcessProcess

Source: TBS CIO

Government On-line: Enabling InfrastructuresGovernment On-line: Enabling Infrastructures

12

The different faces of E-BusinessThe different faces of E-Business

e-Business Infrastructuree-Business Infrastructure

e-Measurement e-Measurement

Project ManagementProject Management

Applications Development & IntegrationApplications Development & Integration

TrainingTraining

Customer Customer Facing Facing e-Sales e-Service e-Support

Customer Customer Facing Facing e-Sales e-Service e-Support

Supplier Supplier FacingFacing e-Supply Chain Optimization e-Procurement & Sourcing

Supplier Supplier FacingFacing e-Supply Chain Optimization e-Procurement & Sourcing

Employee Employee FacingFacing e-Human Resource Management e-Travel Expense Management

Employee Employee FacingFacing e-Human Resource Management e-Travel Expense Management

CitizenCitizen Facing Facing e-Service e-Support“program delivery”

CitizenCitizen Facing Facing e-Service e-Support“program delivery”

13

InfrastructureInfrastructureInfrastructureInfrastructure

14

Web-Commerce Templates Web-Commerce Templates

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Integrated System

Services

15

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

Integrated System

Services

IntegratedSystemServices

Platfo

rms

Bandwidth; ISPs Intra/Extra/Internetmulti-site/ channels

Web-Commerce Templates Web-Commerce Templates

16

Integrated System

Services

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Encryption; User authentication

Web-Commerce Templates Web-Commerce Templates

17

Integrated System

Services

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Page serving; caching; scripts;

component serving

Web-Commerce Templates Web-Commerce Templates

18

Integrated System

Services

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Firewall/Proxy;audit/monitoring

Web-Commerce Templates Web-Commerce Templates

19

Integrated System

Services

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Application: hosting; integration; scalability;

management

Web-Commerce Templates Web-Commerce Templates

20

Integrated System

Services

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Online monitor; transaction mgmt & partitioning;

resource mgmt

Web-Commerce Templates Web-Commerce Templates

21

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Integration of:Internal, external, packaged apps & DBMS services

Web-Commerce Templates Web-Commerce Templates

Integrated System

Services

22

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

Hardware Supported by Products / Organisation

Web-Commerce Templates Web-Commerce Templates

Integrated System

Services

23

Internet Access

Client Security Services

Presentation Services

Infrastructure Security Services

Applications Services

IntegrationServices

TransactionServices

Existing Business Systems

IntegratedSystemServices

Platfo

rms

JDBC, ODBC, CICS Gateways,

MiddleWare

Web-Commerce Templates Web-Commerce Templates

Integrated System

Services

24

Simplified FrameworkSimplified Framework

Internet Access

Back-end Systems

Interface Services

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Planetworks Interspace

Visual Age for Smalltalk, Coldfusion, Metro, Edify, Silverstream and MS Transaction Server

Borderware Firewall and Checkpoint Firewall

Netscape Server, Microsoft IIS, Oracle Webserver, Visual Age for Smalltalk, Coldfusion, Metro, Edify & Silverstream and Apache Web Server

Entrust Suite, Secure ID and Gradient NetCrusader

Netscape Browser, MS Internet Explorer and all access methods

CICS, DB2, Oracle

25

Internet Access

Application Services

Presentation Services

Internet Access

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Internet Access

Back-end Systems

Interface Services

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Levels of Complexity Levels of Complexity

26

ManagementManagementManagementManagement

27

RAD vs Formal SDLCRAD vs Formal SDLC

Small “level 1” sites fit well with RAD Mission Critical applications need a

formal System Development Life Cycle BPR 1st will yield best returns Testing is a MUST Plan for maintainability (design)

Templates / Style Sheets Components (web-centric services)

Small “level 1” sites fit well with RAD Mission Critical applications need a

formal System Development Life Cycle BPR 1st will yield best returns Testing is a MUST Plan for maintainability (design)

Templates / Style Sheets Components (web-centric services)

28

Analyze Existing

Environment

1

Identify & Define

Integration Points

2

Identify Security

Requirement3

Identify Capacity

Requirement

4

Define Connectivity

Strategy5

Define Security Strategy

6

Define Application Component Integration7

Define Presentation

Strategy

8

Web Architecture MethodologyWeb Architecture Methodology

These eight phases define high level strategies required to define a Web Commerce Architecture.

As each phase is completed, it will create one or more deliverables that will be used in the next phase.

This methodology supplements a traditional SDLC

These eight phases define high level strategies required to define a Web Commerce Architecture.

As each phase is completed, it will create one or more deliverables that will be used in the next phase.

This methodology supplements a traditional SDLC

29

Development & IntegrationDevelopment & IntegrationDevelopment & IntegrationDevelopment & Integration

30

Critical Issues for the high-end applicationsCritical Issues for the high-end applications

Integration - FTP, SMTP, HTML, XML all blended into the traditional applications

Security - both real and perceived

Configuration ManagementEven more bits and pieces than before

Performance - media events often cause great peaks, new bottlenecks (proxy, firewall, bandwidth)

Mix & Match Tools - Plethora of immature tools each for a special niche (maintainability)

Reliability - Complex user interfaces, state management, many

test paths

Integration - FTP, SMTP, HTML, XML all blended into the traditional applications

Security - both real and perceived

Configuration ManagementEven more bits and pieces than before

Performance - media events often cause great peaks, new bottlenecks (proxy, firewall, bandwidth)

Mix & Match Tools - Plethora of immature tools each for a special niche (maintainability)

Reliability - Complex user interfaces, state management, many

test paths

31

“Use-Case” Analysis“Use-Case” Analysis

Treat Internet Applications like serious business systems Broader range of users More varied interactions

Consider Batch as well as On-Line How do you integrate with user apps

Object Orient techniques fit well

Treat Internet Applications like serious business systems Broader range of users More varied interactions

Consider Batch as well as On-Line How do you integrate with user apps

Object Orient techniques fit well

32

TrainingTraining

Object-Oriented techniques

Component based architectures

Stateless processing

GUI design

Object-Oriented techniques

Component based architectures

Stateless processing

GUI design

Formal SDLC / methodologies

Configuration Management

Batch processing Legacy Integration

Formal SDLC / methodologies

Configuration Management

Batch processing Legacy Integration

33

Thank YouThank You

top related