SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
How do forward-thinking IT professionals organize infrastructure and staff to meet the challenges of e-Business value chain initiatives head-on? Enriching the Value Chain gives you the answers:
Picking up where The Adaptive Enterprise leaves off, this companion volume tells you how to achieve success in value chain infrastructure planning.
Beyond e-Business: Infrastructure Strategies that Will Enrich Your Value Chain
Click below for Sample Chapter related to this title:
robertsonch1.pdf
(NOTE: Each chapter concludes with a Summary.)
Preface.
1 Beyond e-Business.
Why Infrastructure (Suddenly) Matters.
Getting It Right.
The Importance of Being Adaptive.
The Clash of Cultures.
What's the Solution?
Understanding Adaptive Infrastructure.
Measuring the Benefits.
How to Catalog Components.
Physical Components.
Functional Components.
Interface Components.
Other Components?
Other Layers?
Developing Adaptive Services.
Understanding the Concept.
Applying the Model.
Benefits of Adaptive Infrastructure Services.
Shifting Services to the Infrastructure.
Decoupling the Lifecycles.
Examining the Network Model.
Service Interfaces and Service Level Agreements.
Where to Create Service Boundaries.
Keeping it Real.
Design Guidelines.
How to Apply Services to New Applications.
What Are Patterns?
Designing for the Future.
Asking Who, Where, and What?
How Detailed Should It Get?
Understanding the Major Patterns.
Transact Patterns.
Publish Patterns.
Collaborate Patterns.
Key Patterns for e-Business.
Web Publish Pattern.
3/N-Tier Transact Pattern.
What Patterns Do You Need?
Subdividing Patterns.
Should Patterns for e-Business Be Different?
Applying Multiple Patterns.
The Business/IT Project Lifecycle.
Step 1: Setting Strategy.
Step 2: Choosing Strategic Activities.
Step 3: Matching Activities to Patterns.
Step 4: Refining Patterns and Project Plans.
Step 5: Implementing and Operating.
The Importance of People Skills.
Assessing the Skills Required.
Increased Pressure to Deliver.
New Types of Relationships.
Developing Relationship-based Management.
New Business Roles.
Effective Recruiting.
Retaining Employees.
Understanding Infrastructure Planning.
Details of Project Planning.
Packaging Infrastructure.
Designing Patterns.
Isolation Infrastructure Service.
Understanding Firewalls.
Architecting the Demilitarized Zone (DMZ).
Intrusion Detection and Threat Management.
SSL and Encryption Hardware.
Refining Pattern Designs for Isolation Infrastructure.
Identity Infrastructure Service.
Web SSO: Simple Web-Centric Authentication.
Public Key Infrastructure (PKI).
Directory Server.
Building a Complete Identity Infrastructure.
Refining Pattern Designs in Identity Infrastructure.
Network Layer.
Overview of Networking Technologies.
Scale-Out Design for Performance and Availability.
Network Load Balancer.
Caching Server.
Content Delivery Network (CDN).
Internet Access and Transport Services.
Extranet Service Providers (ESPs).
Hosting Services.
Refining Patterns in the Network Layer.
Storage Layer.
Storage Area Network Interconnect.
Network Attached Storage Solutions (NAS).
Backup/Recovery Architectures.
Storage Options in the Server Layer.
Refining Patterns in the Storage Layer.
Server Layer.
Server Evolution.
Scale-Up Versus Scale-Out.
Scaling Out Web Services.
Server Consolidation.
Refining Patterns in the Server Layer.
Database Layer.
Important Design Issues.
Trends in Database Technologies.
Scale-Out Solutions and Clustered Database Options.
Refining Patterns in the Database Layer.
Integration Layer.
The Integration Server (Message Broker).
The Inter-Enterprise Integration (IEI) Server.
Refining Patterns in the Integration Layer.
Application Server Layer.
Understanding Application Servers.
Choosing Application Servers.
.NET versus J2EE.
Refining Patterns in the Application Server Layer.
Presentation Layer.
Web Server.
Wireless Application Protocol (WAP) Server.
Wireless Service.
Voice.
Interactive Voice Response (IVR).
Refining Patterns in the Presentation Layer.
API Layer.
Understanding APIs.
Refining Patterns in the API Layer.
Management Layer.
Service Level Management (SLM).
Web Application Monitoring Strategy.
A Note on Metrics.
Refining Patterns in the Management Layer.
Using a Test Lab to Increase Performance.
Index to Components.
Competition in the future, even today in certain industries, will not be company against company but supply chain against supply chain. Companies will be only as strong as the weakest link in their supply chain. The winners will be companies that can build electronic B2B relationships rapidly and manage those relationships seamlessly.
To cope in this new world, businesses need more agility. But to get this agility, they need a well-designed IT infrastructure that is highly reusable and adaptive. An agile, adaptive infrastructure can help businesses turn on a dime and capture new opportunities as they arrive.
Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise explains how adaptive infrastructure techniques can create a more focused, organized approach to delivering and supporting high-agility applications for e-Business and beyond. Along the way, the book recommends best practices for dealing with architecture and technology issues within the infrastructure in a way that can lead to success.
Moreover, the book highlights the e-Business-centric infrastructure strategies that will become key internal strategies as well. The days of separate e-Business infrastructure design and delivery are waning, to be replaced by more codependent and jointly developed internal and external infrastructure solutions.
From an infrastructure perspective, the "e" is actually disappearing so that e-Business will become just plain business. Soon, creating a design for inter-nal corporate infrastructure will involve nothing more than dropping a few requirements from high-level e-Business designs. If these internal solutions later need to be reused externally, the infrastructure will already be in place for a simple incremental upgrade to the e-Business level. And e-Business infrastructure will not be all that different from what we now think of as traditional enterprise computing.
active directory services (ADS) 158
active server pages (ASP) 61
adaptability 20
adaptive cost 110
adaptive infrastructure 4
selling it to upper management 18
adaptive infrastructure services 38
administration
centralized and automated 143
agility 33, 39
creating 40
analysis
clickstream 291
pattern analysis 222
pattern-based 29
root-cause 132, 293
appliances
vs. switch-based products 172
application
implementing and maintaining 88
application hosting 193
application management 198, 291
planning 295
application programming interface (API) 32, 77, 92, 283
understanding APIs 285
application programming interface layer 33
application server 220
application server layer 31
application service provider (ASP) 14, 103, 198
application subscriptions 103
application(s)
externalization 207
applications
extranet 154
HTTP 135
integrating 5
Web-centric 139, 143
assets
behind-the-wall 102
authentication 157
cookie-based 142
vs. authorization/b 150
authorization 150
automatic locator information (ALI) 280
bleeding edge 5
border gateway protocol (BGP) 174, 190
buffers 131
business
negiotiating with 110
business vision refinement 101
business-to-business (B2B) 3, 135, 149, 193, 280
integration of 5
business-to-consumer (B2C) 195, 280
business-to-employee (B2E) 195
cache
cache server 175
forward cache 176
proxy cache 176
reverse caching 181
centers of excellence (COE) 89
certificate authority (CA) 147
certificate revocation list (CRL) 153
clusters 170
commercial off the shelf (COTS) 274
Communications Assistance for Law Enforcement Act (CALEA) 280
components
cataloging 24
identifying and cataloging 12
organizing infrastructure 51
computer telephony integration (CTI) 32
consultants
using them 8
content delivery network (CDN) 67, 73, 168, 179, 182, 208
corporate connectivity 189
cryptographic acceleration 138
customer expectations
managing 290
customer interaction center (CIC) 206, 308
customer relationship management (CRM) 78, 283
data warehousing 28, 74
database layer 28
database management systems (DBMS) 128
decoupling 43, 46
defense in-depth 128
delegated administration 157
demilitarized zone (DMZ) 77, 120, 179, 277, 291
extended vs. traditional 121
multi-site 124
parallel 124
design guidelines 48
digital receipts 149
digital signature 149
directory
primary purpose of 158
directory server 153
directory service agent (DSA) 154
directory service markup language (DSML) 160
directory user agent (DUA) 154
distributed servers 183
DMZ Sandwich 122
dynamic link library (DLL) 42
e-Business 14, 23, 26, 148, 154, 206
converging with business 92
expectations of 1
goal of 116
hype vs. reality 2
rapid ascendance of 31
e-Commerce 56, 154, 173
consumer-centric 145
Edge Side Includes (ESI) 185
electronic document interchange (EDI) 5
encryption 132
enterprise application integration (EAI) 30, 77, 126, 155, 207
enterprise resource planning (ERP) 60, 158
enterprise systems management (ESM) 133
ethernet 167
expertise
advanced ISP services 190
extensible markup language (XML) 5, 41, 71, 158, 174, 205, 221, 275
extensible stylesheet language transformations (XSLT) 75
extranet 193
extranet service provider (ESP) 193
fault tolerance 123, 125, 177
feedback system 295
Fibre Channel 209, 212, 218
file transfer protocol (FTP) 48
firewall 116, 138
application proxy 116
clusters 123
dual 122
serial, or DMZ Sandwich 122
single 122
stateful packet filtering 117
flash crowds 186, 202
full-time equivalent (FTE) 134
gap analysis 87
gateway
SQL 47
gateways 28, 142
Global 2000 145
Global Positioning System (GPS) 280
graphical user interface (GUI)
improving off-the-shelf 144
hackers 116, 121, 129, 133, 138, 148, 152
host pattern 60
host-based agents 131
hypertext markup language (HTML) 274, 275
hypertext transfer protocol (HTTP) 71
identity infrastructure
purposes of 160
Infra-API 34
understanding 287
infrastructure 7
definition of 6
identity vs. permission 159
infrastructure patterns 27
integration, reuse of 20
organizing at the platform level 23
permission vs. identity 162
physical 198
raw 23
strategies 9
Infrastructure Pattern Matching (IPM) 14, 56, 83, 88, 90, 105
infrastructure planning 156
strategic vs. tactical 15
inputs, tools, outputs, services (ITOS) 98
instant messaging 68
integrated agents 131
integrated development environment (IDE) 287
integrated threat management (ITM) 133
integrated voice response (IVR) 285
integration layer 30
Interactive Voice Response (IVR) 5, 32, 274, 282
Inter-API 34, 288
understanding 288
inter-enterprise integration (IEI) 30
interfaces
creating 48
Internet Protocol (IP) 282
Internet service provider (ISP) 14, 186
consolidation of 204
Intra-API 34, 288
understanding 287
intrusion detection system (IDS) 116, 128, 138
network-based vs. host-based 129
IP multi-protocol label switching (MPLS) 190
IP transport 193
isolation infrastructure service 121
definition of 115
isolation infrastructure service/b 116
J2EE 220
Java server pages (JSP) 61
key history management 147
key management 152
key pair 146
knowledge management 28
layer
management 289
presentation layer 274
layers 23
creating separate 35
organizing components into 24
legacy platforms 225
legacy systems
integrating 5
lifecycles
decoupling 40
lightweight directory access protocol (LDAP) 139, 154
load balancing 138, 168
load sharing 168
local area network (LAN) 166
manageability
as factor in reverse caches 179
managed security service (MSS) 133
management
data quality 157
marketing
runaway campaigns 202
metadirectories 155
metadirectory 158
middleware 28
mobile application server (MAS) 274, 275
Mooreís Law 219
network architecture 189
network attached storage (NAS) 206, 209
network IDS
limitations of 131
network infrastructure 167
network latency 173
network layer 55
best practices 208
network load balancer (NLB) 125, 135, 140, 168, 170, 173
advantages of 172
integrating SSL into 137
network operating system (NOS) 69, 154, 161
network traffic
minimizing 76
networking 203
nodes
importance of 189
non-repudiation 194
notifications
attack 132
online analytical processing (OLAP) 64
online data stores (ODS) 74
online transaction processing (OLTP) 60, 73, 74, 168
operating system (OS) 225
organizations
Global 2000 133
OSI stack 137
outsourcing 5, 21, 67, 74, 90, 104, 155, 192, 201, 203, 208, 276
hosting services 195
outsourcing patterns 50
ownership
establishing 45
package and communicate 101
package pricing 104
partitioning 20
pattern
1-Tier Transact 60
2-Tier Transact 61, 126
3/N-Tier Transact 29, 32, 63, 75, 122, 126, 127, 138, 168, 182, 192, 201, 220, 289
Client/Server 63
combination of Publish and Transact 74
designing 104
linking patterns with services 88
maturity 58
pattern design 201
pattern refinement 88
phasing out old 225
Real-Time Collaborate 68
refined 112
scalability of a pattern as deciding factor 57
selecting a pattern 111
Store-and-Forward Collaborate 69, 80, 223
Stream Publish 66, 220
Structured Collaborate 70
Web Publish 29, 50, 65, 71, 122, 137, 168, 182, 192, 216, 220
patterns 11, 23, 53
defining 11
identifying modular 13
PCI cards
accelerating site performance 136
peering points 190, 194
performance drag
minimizing 135
permissions management 150, 194
personal computer interface (PCI) 135
personal digital assistant (PDA) 5, 277
personal identification number (PIN) 152
planning
assimilation 101
per-project 100
strategic, or periodic 98
tactical, or per-project 98
platform 11, 23
point of interaction (POI) 208
multiple 76
points of interaction (POI) 33, 119, 275
multiple 90
points-of-interaction (POI) 56
policy
compliance 133
portfolios 16
Predictive Cost Modeling (PCM) 83, 88, 106
presentation 77
presentation independence 19
presentation layer 32
private key infrastructure (PKI) 139
process 112
getting the process defined 89
process model 45
process(es)
repeatable 15
provider viability 191
public key encryption (PKI) 134
public key infrastructure (PKI) 146, 194
public safety access center (PSAC) 281
quality of service (QoS) 202, 205
redundant array of independent disks (RAID) 169
relationship-based management (RBM) 94
reliability vs. performance 174
request for proposal (RFP) 145
resource(s)
dedicated 89
return on investment (ROI) 8, 80
reuse 20, 34, 42, 56, 92, 139, 146, 149, 156, 171
reuse challenges 151
reverse proxies 179
risk management 118
robots 291
role
application developer 17, 34, 46
assigning roles 89
business analyst 287
business manager 87
chief customer officer 96
chief information officer (CIO) 86
chief security officer 96
chief technical officer (CTO) 96
chief technology officer (CTO) 86
infrastructure developer 17, 92, 102, 108, 287
infrastructure manager 87
infrastructure planner 9, 14, 20, 30, 74, 90, 165
internal partner manager 96
IT director 293
programmer 34
relationship manager 95
vendor and sourcing manager 96
role identifiers 158
router 116
router hops 173
rule
80/20 80
scalability 19, 72, 77, 125, 140, 142, 166, 170, 175, 220
challenges of 152
low-cost 168
single-server 154
scale-out 165
as architectural trend 274
scaling
scaling up vs. scaling out 220
SCSI 209
secure HTTP 135
secure socket layer (SSL) 134, 147
secure sockets library (SSL) 73, 168
security 74, 77, 204
security assertion markup language (SAML) 145
server
database 215
server cluster 172
server farm 169
server layer 27
server(s)
server consolidation 221
types of 221
service level
defining 106
service level agreement (SLA) 204, 290, 292
service level agreements (SLA)
negotiating 199
service level management (SLM) 289, 290
service levels 20, 39
defining 48
service(s) 11, 18, 23
adaptive 37
bundling 198
consumer 43
creating 36
decoupling 14
defining adaptive infrastructure service 51
defining service levels 45
desktop 103
externalizing 91
full interface 43
interface 43
keeping the number low 46
non-repudiation/b 149
project 104
provider 43
security and directory 194
Web edge 175
sharing 38
Simple Mail Transfer Protocol (SMTP) 205
Simple Network Management Protocol (SNMP) 134
Simple Object Access Protocol (SOAP) 41, 205, 221
single instance 214
single point of administration (SPA) 144
Single Sign-On (SSO) 140, 148
smart cards 151
smart PC 20, 61, 63
software development kit (SDK) 288
solution(s)
bundling 146
SQLNet 63
SSL session ID 173
stability 38
Storage Area Network (SAN) 26, 206
comparing with network-attached storage (NAS) 210
storage layer 206
stovepipes 11, 20, 54
removing 14
vs. adaptive infrastructure 42
strategy
vs. strategic activities 87
supply chain management (SCM) 78
supply-side caching 138
switching 132
system partitioning 170
TCP/IP 14, 25, 42, 55, 68, 81, 205, 209
definition of 166
test lab 296
threat management 133
tools
Bluetooth 278
Check Point FireWall-1 117
CICS 34
Cisco PIX 117
ColdFusion 61
COM+/.NET 34
Excel 69
Forte 34
freeware tools 120
Haht 61
J2EE 31, 34
Kerberos 146
metadirectory 155
Microsoft IIS 126
Microsoft Money 16
Microsoft Windows 2000/.NET Server 31
NetMeeting 68
Passport 152
Peoplesoft 63
PowerBuilder 34, 61
Quicken 16
Real Application Cluster (RAC) 79
RealPlayer 66
SAP R/3 63
Tuxedo 34
Visual Basic 61
WebLogic 31
WebSphere 31
Windows 2000/.NET 143
Windows Media Player 66
Word 69
total cost of ownership (TCO) 107, 119
lowering 224
traditional DMZ 121
transactional systems 169
transactions per second (TPS) 135
trust
challenges of 152
Universal Description, Discovery, and Integration (UDDI) 41, 205, 221
UNIX 212, 218
usability 132
videoconferencing 68
virtual private network (VPN) 25, 116, 167
voice markup language (VoxML) 275
voice messaging 28
Voice Over Internet (VoIP) 68, 281
voice response unit (VRU) 306
Web hosting 202
web management 291
Web server 121, 141, 154, 157, 169, 171, 172, 173, 202, 213, 215, 274
Web Services Description Language (WSDL) 41, 205, 221
Web Single Sign-On (Web SSO) 77, 139, 142, 145, 153, 154, 159, 162, 180, 194
wide area network (WAN) 166
Windows 2000/.NET 212, 218
wireless application protocol (WAP) 32, 274, 275, 277
wireless application server provider (WASP) 274, 276, 280, 281
wireless markup language (WML) 275
XML query language (XQL) 75