Groove Technologies Collaboration for Software Development.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

EPiServer Connect for Microsoft SharePoint. En översikt: EPiServer Connect for SharePoint.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Chapter 1 Network Operating Systems ISQA424 Instructor: Rob Knauerhase Portland State University.
Client Solution Secure collaboration with partners on customer initiatives and transactions Internal users push content to site without multiple authentication.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
Sharepoint 2007  An integrated suite of server capabilities can help improve organizational effectiveness by providing various processes.  Provides.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.
Time Matters ® A Practice Management, Client Relationship Management, and Document Management System Presented by Alana Seibert.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
February 28, 2007 Pamela Williams. Windows SharePoint Services is an enabling technology that is included in Microsoft Windows Server It provides.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Peer-to-Peer (P2P) Computing Yi Zhang. Agenda History What is P2P Client/Server and P2P Why P2P Problems and possible solution P2P middleware services.
Skype Tamara Taylor.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Module 5 : Security I Jong S. Bok
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Module 1: Introduction to Windows 2000 and Networking.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Electronic Commerce Semester 2 Term 2 Lecture 14.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Secure Connected Infrastructure
Virtual Private Networks
Internet and Intranet.
SECURING NETWORK TRAFFIC WITH IPSEC
Forefront Security ISA
Internet and Intranet.
Comparison of LAN, MAN, WAN
Internet and Intranet.
The Italian Academic Community’s Electronic Voting System
OUT OF BAND AUTHENTICATION
Internet and Intranet.
Presentation transcript:

Groove Technologies Collaboration for Software Development

History - Groove 1982 – Ray Ozzie Leaves Lotus Development 1984 – Ozzie Founds Iris Associates 1987 – Iris Purchased by Lotus 1995 – Lotus Purchased by IBM 1997 – Ozzie Founds Groove (Stealth Mode) 2000 – Groove Emerges from Stealth Mode

History Peer-to-Peer Collaboration – Internet: Originally P2P – 1996 – ICQ, 50 Million Users File Sharing – 1990’s Napster Resource Sharing – 1970’s – Xerox – 1990’s - DEC

True Peer-to-Peer Model

Peer-to-Peer Problems Security Unpredictable Resource Availability Content Control Lack of Standards, Infrastructure Support

Client Server Model

Client/Server Model Problems Bottlenecks, Delays Single Point of Failure Highly Centralized Control Protected Boundaries

Groove Peer-to-Peer Model

Groove Peer-to-Peer Highly Secure Files on Each Workstation Workstation Directly Connected Files Also on Groove Server Absent Members Can Synchronize Cross Boundary Collaboration

Groove PKI Authentication Digital Certificate Certificate Verification

How Groove Works Transceiver – Top Layer – Controls System Tasks Application Layer – Identities – Tools

How Groove Works Accounts Identities Shared Spaces Tools Customization

How Groove Works Account Identity Shared Space

Usage Guidelines Lingering P2P Concerns P2P vs. Client/Server Model Develop the Development Tool

Marketplace Groove and Microsoft – 2001 $51 Million Microsoft Investment – 2002 SharePoint Integration – 2002 Microsoft Solutions of Intranet Integration Groove and Defense Advanced Research Projects Agency (DARPA) – 2001 TIA Project – 2004 Iraq Coalition Provisional Authority

Marketplace Groove and Pfiser – $60 Billion Merger Pharmacia Groove and PTC – 2002 – Wildfire Integration

Marketplace