IT 620 Enterprise Systems Integration January 31, 2002.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

COM vs. CORBA.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 2.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Introduction to Solaris System Paper for COSC513 By Jun LAI SID: #
Active Directory: Final Solution to Enterprise System Integration
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Middleware Fatemeh Hendijanifard 1 آزمايشگاه سيستم هاي هوشمند (
Chapter 17: Client/Server Computing Business Data Communications, 4e.
Web Server Hardware and Software
Distributed Systems Architectures
Distributed Service Architectures Yitao Duan 03/19/2002.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Chapter 7: Client/Server Computing Business Data Communications, 5e.
Component Based Systems Analysis Introduction. Why Components? t Development alternatives: –In-house software –Standard packages –Components 60% of the.
The Architecture of Transaction Processing Systems
J2EE vs..NET Nigam Patel. Topics Background –Web Services, J2EE and.NET Similarities Differences Conclusion –Pros and Con (J2EE and.NET)
EAI. 2/31 Example: a simple supply chain purchase order deliver goods write invoice order atricle check availability document customer-contact not available.
© 2004 IBM Corporation BEA WebLogic Server Introduction and Training.
“Making Software Work Together” TM 1 CORBA and Telecoms.
Understanding and Managing WebSphere V5
The Client/Server Database Environment
John Chen Chairman, CEO, and President. Opposing Forces Client/Server Explorer COM Distributed C Clusters Mainframe Netscape CORBA Centralized Java MPP.
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
EJB Overview Celsina Bignoli Distributed Business Applications Server DB Client DB Server DB.
Quality Assurance for Component- Based Software Development Cai Xia (Mphil Term1) Supervisor: Prof. Michael R. Lyu 5 May, 2000.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
SAP R/3 System: Client Server Overview (Buck-Emden & Galimow, 1998) Dr. K. Palaniappan.
Middleware-Based OS Distributed OS Networked OS 1MEIT Application Distributed Operating System Services Application Network OS.
Architecture of the R/3 System Chapter 14 C & L Chapter 8 M & W.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Borland Janeva.NET Interoperability with J2EE and CORBA Svetlin Nakov Software Development Consultant Sofia University “St. Kliment Ohridski”
COM vs. CORBA Computer Science at Azusa Pacific University September 19, 2015 Azusa Pacific University, Azusa, CA 91702, Tel: (800) Department.
Enterprise Java Beans Part I Kyungmin Cho 2001/04/10.
©Ian Sommerville 2000 Software Engineering, 6th edition. Slide 1 Component-based development l Building software from reusable components l Objectives.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Enterprise Java Beans Java for the Enterprise Server-based platform for Enterprise Applications Designed for “medium-to-large scale business, enterprise-wide.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Introduction to CORBA University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
Chapter 17: Client/Server Computing Business Data Communications, 4e.
GemStone/J 3.0 Objects Across the Enterprise Paul Chambers Chief Technical Officer (Europe)
Version # Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1999 by Carnegie.
Presented By:- Sudipta Dhara Roll Table of Content Table of Content 1.Introduction 2.How it evolved 3.Need of Middleware 4.Middleware Basic 5.Categories.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
25 April Unified Cryptologic Architecture: A Framework for a Service Based Architecture Unified Cryptologic Architecture: A Framework for a Service.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Alan L. Batongbacal CS 4244 / 01 Nov 2000
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
1 Distributed Systems Architectures Distributed object architectures Reference: ©Ian Sommerville 2000 Software Engineering, 6th edition.
Common Object Request Broker Architecture (CORBA)
The Client/Server Database Environment
Chapter 9 – RPCs, Messaging & EAI
Chapter 9: The Client/Server Database Environment
Inventory of Distributed Computing Concepts and Web services
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Inventory of Distributed Computing Concepts
Appcelerator Arrow: Build APIs in Minutes. Connect to Any Data Source
Chapter 17: Client/Server Computing
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
Component-based Applications
Quality Assurance for Component-Based Software Development
Types of Application Integration
Presentation transcript:

IT 620 Enterprise Systems Integration January 31, 2002

Hitachi Quadrasis Vendor Product Analysis Presented by: Rick Jimenez Annie Myers Jason Richards Steven Rosen Ray Vaughan

Costs Requirements to run a Quadrasis system: All three types of middleware runs on a number of different platforms: Microsoft windows NT 4.0, W2K Sun Solaris 7,8 Hewlett-Packard HP-UX 11.0 IBM AIX 4.3.2

Costs Licensing Fees: Per-user – N/A In-house developer – None Per Site – N/A Training – Depending on the complexity of the system Monthly On going All users will be included in training costs

Costs Candidates for training: All members of the staff from managers to data entry personnel (as needed)

Scalability Degree to which the software will support a wide variety of Enterprise-wide System Sizes ranging from small work groups to enterprise-wide solutions

Compatibility All of Hitachi’s middleware offerings are built on top of the TPBroker ORB. Among these offerings is the Hitachi Enterprise Application Manager (HiEM), a distributed application management tool that monitors and controls distributed CORBA applications

Compatibility TPBroker allows the gradual migration of applications towards enterprise-wide computing by preserving co-existence with legacy client and server applications using X/Open’s DTP model TPBroker supports the TX and XA interfaces. Through the use of X/Open XA interfaces, TPBroker provides connectivity to commercial databases such as Oracle® and Microsoft’s SQL Server™

Compatibility Quadrasis’s EASI (Enterprise Application Security Intergration) framework is the perfect complement to EAI solutions that address end- to-end integration requirements The EASI framework links together multiple security technologies and creates a common security infrastructure that avoids potentially less secure and costly custom-built security applications

Compatibility Quadrasis offers the first comprehensive suite of services that provide true Enterprise Application Security Integration and meets e- business security requirements across multiple industries, including: Financial services Telecommunications Manufacturing Pharmaceuticals and others

Compatibility

Documented Performance s/hss1.pdf corner/hitachi.html detail?id= _944&type=RES &src=FEATURE_SPOTLIGHT&x=

Functionality & Industry Focus Hitachi Security Service (HSS): CORBA Security Service Software for Enterprise-Wide Security Management: Administrators manage and maintain security across distributed application environment Enables developers to create secure applications

Functionality & Industry Focus Key Features: Single Point Administration Multiple Authentication Methods Password RSA Secure ID Flexible Access Control Auditing Legacy Integration OMG Standards

Components, Functions and Enhancements Manager and Administrative Console SDK (C++ and JAVA Libraries) Runtime Services

Business Functions Supported All sectors which need secure distributive environments

Enterprise Application Security Framework (EASI) Distributed enterprise protection from end-to-end Secure data access and resource management across enterprise E-business dictates access to intranet data B2B, B2C, & remote access Firewall inadequacies

Enterprise Application Security Framework (EASI) EASI Framework Links multiple security technologies Creates common security infrastructure

Enterprise Application Security Framework (EASI)

Key Features: End-to-End Security within enterprise Common Infrastructure Open Standards Integration of future solutions Increased deployment speed of best-of-breed security technologies Reduced management cost

Functions & Enhancements Meets wide range of e-business requirements across many industries : Financial Manufacturing Telecommunications Pharmaceuticals

Functions and Enhancements Pre-built security integration components: Wrapper Interceptors Bridges Context Managers

Hitachi TP Broker Messaging Middleware for Enterprise Application Integration Enterprise-class infrastructure for transaction management Foundation for EAI

Hitachi TP Broker Key Features: ORB based CORBA 2.1 environment Inter-ORB Protocol (IIOP) Interoperability with development tools and best-of-breed technologies Object Oriented foundation Load Balancing Connection management Reduce time-to-market

Hitachi TP Broker Components, Functions and Enhancements: TP Broker C++ TP Broker Java Distributed objects Smart Agent Architecture Single or Multi-thread Processing Connection management IDL Mapping Flexible Transaction Management Distributed OTS Dedicated Daemon Two –phase commit (Data Integrity) Tools for managing sessions and system process

Security Facilities Profile Manager Security Association Security Proxy Services

Tools Authentication Authorization Cryptography Accountability Security Administration

Aware Applications Security Aware Applications Uses security APIs to access and validate the security policies Security Unaware Applications Need interceptors that call security on behalf of the application Security Self-reliant Does not need or want framework security

Type of Solution Soup to nuts From APIs to total integration Standard API (EJB and (CORBA) Custom Security API (no standard available) Vendor Security API (proprietary)

Usability Factors Provides centralized and remote security control over a distributed environment, with an easy-to-use GUI console for definition and management of the companies security policy Access to operation, interfaces and objects can be authorized by groups or individuals

Mature System Other than a few s from the company staff, NO buzz in the industry If you were doing Security, would you brag about it? Would you want your customers to open up about it? Suspect this is limited to a very few companies with severe security issues

Product Classification This enterprise-class solution provides a means of controlling application/system access in a distributed environment. Complies with and exceeds the OMG CORBA security service specifications C++ & Java

Conclusion EAI with Security as the driving force All levels of the system Not a simple solution, but then again, not a simple problem to solve When you think about it, linking everything with EAI will connect hackers with your data in all new ways. Let the Link be the Security too !