© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.

Slides:



Advertisements
Similar presentations
…and a natural peer-to-peer platform!. Jabber as P2P Platform Agenda Why spend time in this session? What is Jabber? Who cares about Jabber? How does.
Advertisements

Encrypting Wireless Data with VPN Techniques
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
ILS Technology Named Top M2M Application Enablement Platform Vendor
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
World’s Most Accurate Location-base mobile application platform.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 1.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
8.
The Internet & The New IT Infrastructure Chapter 9.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
02/12/00 E-Business Architecture
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Mobile Computing Lecture: 4.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Ch 13. Wireless Management and Support Myungchul Kim
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
70-411: Administering Windows Server 2012
Ch 11. Integrated Architecture for Wireless Myungchul Kim
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
1 © Copyright IBM Corporation 2000 TPF in a Distributed World Stuart Waldron October 16, 2000 Any references to future plans are for planning purposes.
Mark J. Salamango Chief Pervasive Architect USA TACOM Tel: Fax: Pervasive Computing: Why did the logistics.
Source: Peter Eeles, Kelli Houston, and Wojtek Kozaczynsky, Building J2EE Applicationa with the Rational Unified Process, Addison Wesley, 2003 Prepared.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Requirement for Enterprise Directory Services A Customer Influenced Perspective TOG DCE Program Group ® Brian Breton Gradient Technologies, Inc.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Geospatial Systems Architecture Todd Bacastow. Views of a System Architecture Enterprise Information Computational Engineering Technology.
Web Application for Mobile access to students exam Information.
Internet of Things (Ref: Slideshare)
Knowledge Outsourcing Software Development Services MRI FZE Suite 217, Twin Towers, Deira Creek, Dubai, UAE Tel FAX
Girish M. Jashnani Sales Consultant Manage your E-Business Suite more effectively.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Interaction classes Record context Custom lookups.
Overview of SAP Products & Components SAP AG – An Overview World’s Leading Provider of Business Management Software Established in Headquarters.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
Securing Access to Data Using IPsec Josh Jones Cosc352.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
© 2009 SAP AG Introduction to SAP ERP Abstract This teaching material is intended to explain how the fundamental business processes interact with SAP ERP.
SAP Integration with Oracle 11g Muhammad Raza Fatmi.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
Goals Introduce the Windows Server 2003 family of operating systems
Enabling the hybrid cloud with remote access appliances
Requirements and Approach
Pitch Deck.
Requirements and Approach
Presentation transcript:

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary Enterprise Computing Today Business Processes Web Clients Content + User Interaction Web Services (100’s of Millions) Business Processes Transactions and Data Mining EnterpriseComputing

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary The Internet of Devices Business Processes Web Clients Content + User Interaction Web Services (100’s of Millions) DeviceComputing Autonomous Devices Telemetry + Control (10’s of Billions) Transactions + Data Mining EnterpriseComputing

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary Engineering Requirements of Device Applications BackEnd Systems Enterprise Application Logic, Server and Gateway Wireless Internet Building Sensor/Control Business Logic - Output data accumulation - Building health monitoring - Bulding system control Other…non-trivial! - Bi-directional Authentication - Secure communication - Multiple/changing networks & protocols - Remote administration - Identity management - Remote administration - Data Validation - Software Upgrades …and so on

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary Many Applications, Many Devices VPN Internet Dial-up ISP CRM System/Network Management Enterprise Network Inventory & ERP Operations & Logistics Customer Services Enterprise Cellular Paging Device Sensor Scanner Sensor Product Device Controller Sensor Scanner Device Scanner Device Controller

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary The ConnecTerra Solution Wireless Enterprise IT ConnecTerra Identity-based Communications Layer Internet Device App 1App 2App 3 Paging Device Many Applications Many Devices Many Networks One secure platform One customizable application suite One management infrastructure ConnecTerra Enterprise Device Computing Platform Device ICL App Connec- Terra Core Services

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary Secure Identity: the Foundation Unique, authenticatable identity given to –Devices –Users –Applications Communication directed to identities, not addresses Policy-based administration driven by identity attributes All data tagged and correlated by identity Secure, authenticated Identity

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary Security Requirements Identity authentication – bidirectional Authorization Secure communications Behavioral verification Identity establishment – device and user Identity (& key) management

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary ICL Communication Services Message Interface DeviceEnterprise Enterprise App Device-side App ICL Internet Enterprise App Other Net Bi-directional authentication Multi-network, multi-protocol Encryption & Integrity (policy- controlled) Authorization (policy-controlled)

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary ICL Administrative Services Identity Repository Policy Database Authentication Service Presence & Availability Service Identity-based Communications Layer (ICL) Core Services: - Identity - PAM - Policy - Authentication

© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary ConnecTerra Product Suite Value Proposition –Provides the security required in enterprise device applications –Supports wide range of networks and device types –Provides scalable management of devices –Dramatically lowers custom code on a project Lower development cost Speeds time to market –Promotes cross-project interoperability ConnecTerra Identity-based Communications Layer App 1App 2App 3 ConnecTerra Enterprise Device Computing Platform Connec- Terra Core Services