Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.

Slides:



Advertisements
Similar presentations
Evaluating IT Professionals Through Values - Based Performance Appraisal Systems February 17, 2005 Presented by: Jenifer Jarriel and Mary Sloan.
Advertisements

Copyright Policy Copyright Cathy O’Bryan This work is the intellectual property of the author. Permission is granted for this material to be shared.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
On Beyond Z Building a Directory Service educause presentation #074 University of Colorado at Boulder Deborah Keyek-Franssen Marin Stanek Paula J. Vaughan.
E-Biz Forum 2002 E-Business Forum May 16, 2002 Steve Relyea Vice Chancellor – Business Affairs University of California, San Diego.
Emergency Notification Systems - ISU Alert EDUCAUSE Midwest Regional ISU Alert Carol McDonald Information Systems Leader Information Technology.
Information Resources and Communications University of California, Office of the President Information Technology Services The California State University.
LBNL / UCSD LBNL/UCSD Discussion June 29, 2005 Business Architecture and the Balanced Scorecard.
Regents Update New Business Architecture Project 2010 Jan00 meeting notes.doc March 17, 2004 Accelerating the New Business Architecture An Update for the.
Student Affairs Retreat UCSC UCSC Student Affairs Retreat September 9, 2003 Steven Relyea University of California, San Diego Portal Strategies and The.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
1 Implementing the New Business Architecture University of California, San Diego January 18, 2006.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
COVCA/Campus Planning & Budget Officers April 3, 2003 Meeting.
Identity Management: The Legacy and Real Solutions Project Overview.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
IT Strategic Planning From Technical Dreams to Institutional Reality
Carolyn Awalt University of Texas at El Paso Paul Resta
Copyright C. Grier Yartz This work is the intellectual property of the author. Permission is granted for this material to be shared.
Steve Neiheisel Industry Consultant Creating a Technology Forum for the Whole Campus Presented by Executive Services of Jenzabar (c) Copyright 2006 Jenzabar,
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
3/20/20071 IT Strategy and Leadership in Higher Education: Two Case Studies Case 1: Roberts Wesleyan College. Presented by Pradeep (Peter) Saxena, CIO.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Turning Information Into Action: Enterprise Reporting at Columbia University Maria E. Mosca, Director Student Information Systems Columbia University in.
University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
CUMREC 2002 May 15, 2002 Steve Relyea Vice Chancellor – Business Affairs University of California, San Diego.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Copyright - L. Thanasides, 2002 Using the Right FACTS Can Be Informative: Florida’s Statewide Student Information System Linda Thanasides Marsha Stickel.
You’ve Built The Pieces, Now Integrate Your Enterprise! Mid-Atlantic Regional Conference January 17, 2003 Patty Gertz, Princeton University
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
The Team Approach: A Paradigm Shift for Designing Successful Online Courses NERCOMP 2005 College for Lifelong Learning, Manchester, NH.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Best Practices For Using Technology To Deliver Instructional Support Services Dr. Steven G. Sachs Northern Virginia Community College Copyright Steven.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
Counting the Costs Mark Piper - University of Newcastle Steve Robertson - Campus Consulting Copyright Steve Robertson and Mark Piper, This work is.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
UWM CIO Office Where Did These Customizations Come From? Do We Need Them? March 14, 2007 Jill Unglaub, Senior Application Analyst Information and Media.
Copyright Copyright University of Washington This work is the intellectual property of the author. Permission is granted for this material to be.
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
A Strategy for Moving from Commercial to an Open Source Environment Jeshua Pacifici, GEDI Assistant Director and Learning Systems Consultant.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
University of Southern California Identity and Access Management (IAM)
Jill Forrester and David Kelly| October 20, 2011
Walking the Line Between Customer Service and Customer Codependency
University of Southern California Identity and Access Management (IAM)
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

Middleware 101 Dave Tomcheck UC Irvine

Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders

Drivers & Assumptions Unprecedented Growth of Enrollments: Admin Resources Will Not Increase In Proportion to Campus Growth Increase in Complexity of Fed & State Relationship

Competitive Labor Market New Staff Will Not Have Adequate Skills/Training Technology is Changing the Way Business is Conducted Drivers & Assumptions

Why a New Business Architecture? A Vision to Stimulate Initiatives A Context for Setting Priorities Strategies to Increase Staff Productivity Communication of Business & Infrastructure Requirements

Members of the New Business Architecture Planning Group Steven Barclay, San Francisco Judith Boyette, HR (OP) Wendell Brase, Irvine Anne Broome, Controller (OP) James Dolgonas, CIO (OP) Kristine Hafner, Staff Sam Morabito, Los Angeles Steven Relyea, San Diego Thomas Vani, Santa Cruz

Key Components of a New Business Architecture Page 7 of Report

Integration of business transactions with policies, guidance, and training A New Business Architecture for UC

Page 7 of Report Establish UC as a competitive employer and provide staff the tools to succeed A New Business Architecture for UC

Page 7 of Report Redesign Processes to facilitate getting work done rather than cover all potential transactions A New Business Architecture for UC

Page 7 of Report Authenticate, authorize, provide effective tools A New Business Architecture for UC

Page 7 of Report A New Business Architecture for UC Employ emerging standards to improve integration of financial data

Page 7 of Report A New Business Architecture for UC Embed performance metrics into the way UC conducts its business and strengthen financial controls

Departments CentralOffices Where are Support Costs?

Pages 8-11 of Report Single Authentication/Authorization (Lightfoot Model) Establish Super-Intuitive Navigation Integrate Information, Transactions, Training, Templates Business Portal

Focus on Those New To Roles Develop Content that is Simple, Relevant, Recent Move From HTML to Content Management System Business Portal Pages 8-11 of Report

UC as an Employer of Choice New Application Processes Designed for Candidates Flexible and Effective On-Line Training Baseline Skills Development thru the Portal Providing Intuitive Tools to Ensure Staff Success People Pages of Report

Initiate Aggressive Program to Eliminate Paper-Based Processes Integrate Policies and Procedures into Applications Remove Non-Value Added Steps Ensure Performance Metrics are Built-In To Processes Processes/Policies Pages of Report

Move From Proprietary Systems to Standards Promote A Model that Emphasizes Users & Departments Make All Business Processing Web-Based Ensure Adequate Security & Authentication Identify & Develop Self-Service Applications Enabling Technology Pages of Report

Provide All Financial Reporting & Transactions on Web Provide Flexible Dept. Tools for Projections & Modeling Use XML Protocol to Link All Campus Financial Systems Financial Systems Pages of Report

Financial Systems

A Portal (By Itself) is Not the Whole Answer Shift Thinking from Static Web Model Content is King Navigation / Look & Feel / Templates Implications for Stakeholders

Content Owners Web Masters P/P Experts vs. Journalists CFO/CIO Partnership Implications for Stakeholders Changing Roles:

Business Office Drives Application Technology is Driven by the Application Requirements IT Provides Architecture for Data Access and Security IT Must Participate in Standards Bodies Implications for IT Folks

Resources Integration Across Organizations Exposure of Broken Processes Implications for Campuses

Single Authentication for all Applications Authorization for Access Attribute Directory for Role Based Information Messaging Provides Notification Propagation Portal is Middleware that Glues Disparate Systems Together Legacy Integration Highlights

ucsd.edu Obtain The Full Report at... Thank You Copyright Regents of the University of California This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.