1 © Copyright IBM Corporation 2000 TPF in a Distributed World Stuart Waldron October 16, 2000 Any references to future plans are for planning purposes.

Slides:



Advertisements
Similar presentations
Tivoli Storage Manager v. 4.1 Executive Presentation.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
1 Enabling Personal Databases To every Citizen. To create a Global Personal Network that facilitates Information Flow between people Every person in the.
Internet, Intranet and Extranets
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
8.
The Internet & The New IT Infrastructure Chapter 9.
Communication Challenges Communication Overload Distributed teams, partners, and customers High cost of communications Security and compliance.
Outline IS400: Development of Business Applications on the Internet Fall 2004 Instructor: Dr. Boris Jukic Web Applications for Business: Performance Issues.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
 Copyright 2011 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Linking the Real World Manfred.
Oracle Products Overview Internet Computing Indrek Peenmaa Sales Consultant Oracle Corporation
ORACLE APPLICATION SERVER BY PHANINDER SURAPANENI CIS 764.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Title Date. Play video [:30 seconds]video Micael BergerDaniel Alm ProduktchefTeknisk säljspecialist.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Ravi Sankar Technology Evangelist | Microsoft Corporation
Barracuda Networks Steve Scheidegger Commercial Account Manager
Clinic Security and Policy Enforcement in Windows Server 2008.
By Isaac Parenteau. Agenda  What is the certification?  What are the courses required for it?  Future Careers  Cost?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 Directories and Policy-Based Networking - Strassner Directories & Policy-Based Networking 0827_02F8_c1 John Strassner Cisco Systems.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
1 Yoram Arbel C o m o x Convergent Communication Applications Using SIP Yoram Arbel Comox Inc.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
A New IMS-Like Architecture for Enterprise Applications Reid Stidolph Master Principle Solutions Architect Communications Global Business Unit October.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
® 2007 Solid Information Technology Data Management for Automotive Standardization requirements Franz-Josef Maintz Solid Information Technology
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Video Communication Market Trends Rafi Anuar Director, Product Management.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Distributed Computing Systems CSCI 4780/6780. Distributed System A distributed system is: A collection of independent computers that appears to its users.
Distributed Computing Systems CSCI 4780/6780. Geographical Scalability Challenges Synchronous communication –Waiting for a reply does not scale well!!
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
©2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Deployment on your terms Hybrid Exchange deployment on your terms On-premises.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Secure Connected Infrastructure
Designing the Physical Architecture
Introduction to Windows Azure AppFabric
City-wide Active Directory Project Town Hall II
See: under Projects and Planning
Design Decisions / Lessons Learned
Chapter 1: Exploring the Network
CHAPTER Introduction to LANs
Implementing Client Security on Windows 2000 and Windows XP Level 150
Developing for Windows Azure
Presentation transcript:

1 © Copyright IBM Corporation 2000 TPF in a Distributed World Stuart Waldron October 16, 2000 Any references to future plans are for planning purposes only. IBM reserves the right to change those plans at its discretion. Any reliance on such a disclosure is solely at your own risk. IBM makes no commitment to provide additional information in the future.

2 © Copyright IBM Corporation 2000 Mobile & Internet penetration EU & US

3 © Copyright IBM Corporation 2000 Next Generation Internet High bandwidth, low cost Integrated voice, video and data Wireless clients pervasive Server based computing Accelerate the focus on business to business

4 © Copyright IBM Corporation 2000 Infrastructure Requirements High transaction rates Integrate new and existing systems Rapid application development Security, manageability Data mining New devices, Multi-modal

5 © Copyright IBM Corporation 2000 Edge Servers Routing Security/Firewall Transcoding Caching Load balancing VPN

6 © Copyright IBM Corporation 2000 Web Application Servers

7 © Copyright IBM Corporation 2000 Security Services Federation and meta models with standards are key Directory Security certificates Single and global sign on Security policy administration

8 © Copyright IBM Corporation 2000 Enterprise Servers Simple to complex integration Scalable transaction servers Scalable corporate databases

9 © Copyright IBM Corporation 2000 Topology for e-business

10 © Copyright IBM Corporation 2000 TPF Systems today in e-business

11 © Copyright IBM Corporation 2000 TPF Potential, Remove the Bottlenecks

12 © Copyright IBM Corporation 2000 Mail in e-business