The Open Group: An Introduction Interoperable Informatics Infrastructure Consortium May 6th, 2003 Your Name Title Mobile +1 415 999 9999 GSM +44 7771 999999.

Slides:



Advertisements
Similar presentations
Universal Fulfillment Organizer Leads CHT to NGOSS
Advertisements

Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
Informal Forum Summit Meeting Geneva, Switzerland 3-4 December 2001 Allen Brown President and CEO
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
The Open Group Architecture Framework (TOGAF) Version 7.
SOA Update from The Open Group OMG Technical Meeting 4 December 2006 Dr Christopher J Harding Forum Director Tel Mobile
GSC16-OBS-03 ITU-T GSC – 16 Observer Presentation Karen Higginbottom, JTC 1 Chair.
Copyrights 2002 Introduction to SAP Enterprise Portals September SAP Enterprise Portal 101 Naeem Hashmi Chief Technology Officer Information Frameworks.
12006/9/26 Emerging Grid Standards Mark Baker, Amy Apon, Clayton Ferner, Jeff Brown. IEEE Computer Society,Vol. 38, Issue 4, pp , Year of Publication:
Enterprise Architecture
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Getting Smarter with Information An Information Agenda Approach
TeleManagement Forum The voice of the OSS/BSS industry.
An Introduction to the new features in TOGAF® 9
The Internetworked E-Business Enterprise
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
An Overview of TOGAF® Version 9.1
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
Boundaryless Information Flow and Web Services Customer Council July 23, 2002.
Business Productivity Infrastructure Optimization The Business Productivity Infrastructure Optimization Campaign For Microsoft Office 2007 Module 25 –
European Broadband Portal Phase II Application of the Blueprint for “bottom-up” broadband initiatives.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
An Open Group Perspective James de Raeve VP Business Development
Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Basic Profile 1.0 August 12, 2003 Copyright © 2003 by.
1 World Wide Consortium for the Grid Global Grid Forum Network-Centric Operations Community Session 28 June
Video Media Center (VMC 1000 ™ ) Turn communications into content.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
The OIF: A Beacon for Industry Progress and Convergence.
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
The Open Group Architecture Framework (TOGAF) Version 7 John Spencer, Director – Architecture Forum Anaheim, January 24 th 2002.
RBC Supply Chain Solutions. Who we are ? RBC Sourcing provides e-procurement solutions through a unique blend of proven on-demand technologies, affordable.
| Collaboration at Rural Business Approach.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Copyright © The Open Group 2014 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Copyright © The Open Group 2011 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
IEEE IT (Information Technology) Strategy – 2005 Unapproved.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Comprehensive Project Management Solutions with the.NET Server family.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 Industry Advisory Council’s Enterprise Architecture Shared Interest Group (IAC EA SIG) Collaborative Approach to Addressing Common Government- Industry.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
CIM Modeling for E&U - (Short Version)
TeleManagement Forum The voice of the OSS/BSS industry.
ISO/IEC Joint Technical Committee 1 ISO/IEC JTC 1
An Open Group Perspective
Integrated Management System and Certification
Driving Digital Business with SAP Digital Business Services
Security and Boundaryless Information Flow
20 September 2018 Open Architecture Methods: TOGAF (The Open Group Architecture Framework) A Presentation to the Real-Time and Embedded Systems Forum,
Enabling Collaboration with IT
ISO/IEC Joint Technical Committee 1 ISO/IEC JTC 1
Innovative content & language solutions: Transforming digital.
Karen Bartleson, President, IEEE Standards Association
Presentation transcript:

The Open Group: An Introduction Interoperable Informatics Infrastructure Consortium May 6th, 2003 Your Name Title Mobile GSM Montgomery Street Suite 960 San Francisco, CA USA Tel ext. 200 Fax David Lounsbury Vice President Advanced Research & Innovation 29B Montvale Ave Woburn, MA USA Tel Fax

The I3C Mission  I3C develops and promotes global, vendor- neutral informatics solutions that improve data quality and accelerate the development of life science products.

To Achieve the Mission..  Conflicting forces must be balanced to succeed  Free information exchange and IPR  Regulatory compliance and operational efficiency  Standardization and complexity  The signs on how to proceed are not always clear The I3C is not alone in these challenges!

The Open Group Mission To drive the creation of Boundaryless Information Flow™ by:  Working with customers to capture, understand and address current and emerging requirements, establish policies and share best practices;  Working with suppliers, consortia and standards bodies to develop consensus and facilitate interoperability, to evolve and integrate open specifications and open source technologies;  Offering a comprehensive set of services to enhance the operational efficiency of consortia; and  Developing and operating the industry's premier certification service and encouraging procurement of certified products.

Boundaryless Information Flow ™  To achieve Boundaryless Information Flow™ an organization needs to put in place infrastructure services that bring information together and provide that information to those users and applications that need it.  Boundaryless Information Flow™ represents a set of challenges that most companies have.  The Open Group is tackling the problems represented by Boundaryless Information Flow™ and is the place in the industry to work on these issues.

I3C and The Open Group  By working together, the I3C can leverage The Open Group’s work to achieve a vision of a Interoperable, Secure and dependable Informatics Infrastructure  Opportunities exist for immediate benefit  Architecture  Security  Directory

The Open Group is..  A global consortium committed to delivering greater business efficiency by bringing together buyers and suppliers of information technology to lower the time, cost and risk associated with integrating new technology across the enterprise.  Methods  Best practices guides  Practical guiding principles  Frequently found issues and solutions  Select and integrate standards  Profiles of the standards  Proof of concepts  Certified products  Enterprise architecture method  Best practices on business information directory  Best practice for information delivery  Overall gap and overlap reports  Reports on alternative approaches  Proof of concept reports Information Infrastructure Business Technical

Our Role  Ensure requirements derived from real interoperability issues are driving standards (Customer view)  Ensure technical direction of interoperability standards are addressing market needs (Supplier view)  Enable peers to share best practice and learn from the experiences of others  Enable networking with knowledgeable people who are making an impact on the technical direction of IT industry  Provide a forum for IT standards with a focus on interoperability  Build relationships with other consortia  Deliver assurance of interoperability through certification and testing

Delivering on the Roles Customers Requirements Business Scenarios & Challenges Policies and best practice Case studies and shared experience Guides Collaborative authoring Tools and methodologies Adopt and adapt Procurement Single organization or combined Suppliers Solutions Through their products Response to requirements Technical direction Standards Adopt, adapt and integrate specifications Technology Sponsor Open Source developments Conformance to standards Established through certification and testing

Our Sponsors  Sponsors provide over $300 billion worth of IT products world-wide annually  Ship significant volume products branded by The Open Group

Diverse Membership  Members represent a wide range of company sizes, industries and public/private organizations  Members have combined IT budgets of over $50 billion annually  For example:

Relations with Consortia and Other Organizations  Austin Group Austin Group  Association of Interactive Media Association of Interactive Media  Bluetooth SIG Bluetooth SIG  Carnegie Mellon University Carnegie Mellon University  Center for Internet Security (CIS) Center for Internet Security (CIS)  Data Interchange Standards Association Data Interchange Standards Association  Database Interoperability Group Database Interoperability Group  DCI DCI  DMTF DMTF  DSML DSML  EEMA EEMA  Free Standards Group Free Standards Group  Global Grid Forum  GMD Fokus Group GMD Fokus Group  ICX Security ICX Security  IEEE PASC IEEE PASC  IEEE Standards Association IEEE Standards Association  IETF IETF  Internet Mail Consortium Internet Mail Consortium  IPv6 Forum IPv6 Forum  (ISC)2 Information Security Forum (ISF) (ISC)2Information Security Forum (ISF)  Internet Security Alliance Internet Security Alliance  ISO/IEC SC22 WG15 ISO/IEC SC22 WG15  ITU-T ITU-T  J Consortium J Consortium  Linux Standards Base Linux Standards Base  MPLS Forum MPLS Forum  MWIF MWIF  NCITS R1 NCITS R1  NAC NAC  NIST PCSRF NIST PCSRF  OASIS OASIS  OMG OMG  OSGi OSGi  POSC POSC  PCCA  QoS Forum QoS Forum  SAE SAE  SNIA  SyncML SyncML  Telecommunications Industry Association Telecommunications Industry Association  TMF TMF  UDI Consortium UDI Consortium  UDDI UDDI  W3C W3C  WAP Forum WAP Forum  WEMA WEMA  X.Org X.Org

Services Continuum Management Services Strategy Services Standard s Collaboration & Research Certification & Testing time goals The Open Group Membership NASPL JAVA ICSC IBIX OMP Bluetooth SIG Mobile Directory Secure Messaging WAP MHP LINUX DMTF Management Services  Consortia Formation  Operations  Infrastructure Provision Strategy Services  Business Scenarios  Architecture development Collaboration & Research  Interoperability events  Homesteading  Research & Innovation Certification & Testing  Program development  Test development  Certification Operations Standards  Technical editing  Consensus review process  Publication

Specific Interaction Opportunities  Architecture  Security  Directory

Architecture  An effective framework Resource Base BBIBSIBTRM ADM Target TOGAF Knowledgeable and professional practitioners Adequate “Commercial Off-The-Shelf” tools TOGAF Tool Support Certification TOGAF Training Certification TOGAF Practitioner Certification TOGAF Prof. Svcs. Certification TOGAF “Enterprise Edition”

The “Enterprise Continuum” Foundation Architectures Common Systems Architectures Industry Architectures Organisation Architectures Systems Solutions Industry Solutions Organisation Solutions Products & Services Solutions Continuum Guides & Supports Guides & Supports Guides & Supports Guides & Supports Architecture Continuum

“Enterprise” ADM - Key Points A Architecture Vision H Architecture Change Management G Implementation Governance C Information System Architectures Requirements B Business Architecture E Opportunities and Solutions F Migration Planning Prelim : Framework and Principles D Technology Architecture An iterative method Each iteration requires decisions on: Focus - enterprise coverage Time horizon aimed at Architecture assets to be leveraged assets from previous iterations assets available elsewhere (other frameworks, system models, vertical industry models, etc.) Decisions made on practical assessment of: resource / competence availability value expected to accrue to the enterprise

Phone Books/Directories Boundaryless Information Flow - Business Taxonomy Mobility Policy Information Provider Management Organization Brokers Development Organization Information Consumers Performance Service Level Manageability Policy Security Policy

Qualities Application Platform Boundaryless Information Flow - Technical Taxonomy Mobility Policy  Classes of Interfaces - formats and protocols … Information Provider Applications Management Utilities Brokering Applications Development Tools Information Consumer Applications Performance SLAs Manageability Policy Security Policy

Qualities Application Platform A Level 2 Model Information Provider Applications Management Utilities Brokering Applications Development Tools Information Consumer Applications Desktop Video Conference information AccessStreaming audio / video Mail Phone / Fax Web Portal Business modeling tools Design tools Construction tools Languages and Libraries Monitors Executory Utilities Copy Managers Mobility PerformanceManageability Security Information Brokers Application Integrators Desktop Video Conference information AccessStreaming audio / video Mail Phone / Fax Web Portal Application to application communications services Directory Referencing/Dereferencing Naming Registration Publish Subscribe Discovery Digital Signature Intrusion Detection Key Management Firewall Encryption AAAC SSO Presentation Transformation Browser services Portal and personalization Meta indices Information Access Transformation Mapping Query distribution Aggregation Search File services Web services Application Messaging Languages Libraries Registries Application Message Format Info Format eForm services Instant messaging services Messaging/Event BrokeringProcess/Workflow Control Enterprise Appl Integration

Security

Security – our Vision  Security is about achieving business objectives within applicable law and policy  Managing risk  Not merely preventing bad things  Security creates protected systems with controlled perimeters  A controlled perimeter is “boundaryless” where (and only where) it needs to be  Security design is necessarily pervasive

 Bridge the gap between business objectives and traditional “security” technology  Identifygaps in both understanding and technology  Better understanding between buyers and suppliers  Positioning within the Security Life Cycle – Concept, Requirements, H-L Design, L-L Design, Implementation, Integration, Test & Certification, Operation & Maintenance, Obsolescence & Succession.  Develop collaborative activities with other consortia to avoid duplication of effort & leverage best-of-breed solutions  A big part of the problem is just defining exactly what problem we’re solving Security – our Mission

Directory Interoperability Directory HR Access Control Identity Manage- ment Mobility CRM Provision- ing Single Sign-On Web Services

Working Together  We’d like to invite the I3C to work with The Open Group to identify and establish standards and best practices in  Boundaryless Informatics Architecture  Security Policies and Risk Management practices  Directory Interoperability

In conclusion  By engaging with other IT vendors and customers working toward a vision of Boundaryless Information Flow™, the I3C can realize:  Faster and simpler identification of necessary interoperability, reliability standards for informatics  Faster availability of necessary informatics standards in commercial practice = Faster and more efficient deployment of life science products

Thank You Any Questions? Your Name Title Mobile GSM Montgomery Street Suite 960 San Francisco, CA USA Tel ext. 200 Fax David Lounsbury Vice President Advanced Research & Innovation 29B Montvale Ave Woburn, MA USA Tel Fax