Download presentation
Presentation is loading. Please wait.
Published bySilas Harmon Modified over 9 years ago
1
The Open Group: An Introduction Interoperable Informatics Infrastructure Consortium May 6th, 2003 Your Name Title Mobile +1 415 999 9999 GSM +44 7771 999999 a.person@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 200 Fax +1 415 374 8293 www.opengroup.org David Lounsbury Vice President Advanced Research & Innovation d.lounsbury@opengroup.org 29B Montvale Ave Woburn, MA 01801 USA Tel +1 781 376 8203 Fax +1 781 376 9358 www.opengroup.org/ar
2
The I3C Mission I3C develops and promotes global, vendor- neutral informatics solutions that improve data quality and accelerate the development of life science products.
3
To Achieve the Mission.. Conflicting forces must be balanced to succeed Free information exchange and IPR Regulatory compliance and operational efficiency Standardization and complexity The signs on how to proceed are not always clear The I3C is not alone in these challenges!
4
The Open Group Mission To drive the creation of Boundaryless Information Flow™ by: Working with customers to capture, understand and address current and emerging requirements, establish policies and share best practices; Working with suppliers, consortia and standards bodies to develop consensus and facilitate interoperability, to evolve and integrate open specifications and open source technologies; Offering a comprehensive set of services to enhance the operational efficiency of consortia; and Developing and operating the industry's premier certification service and encouraging procurement of certified products.
5
Boundaryless Information Flow ™ To achieve Boundaryless Information Flow™ an organization needs to put in place infrastructure services that bring information together and provide that information to those users and applications that need it. Boundaryless Information Flow™ represents a set of challenges that most companies have. The Open Group is tackling the problems represented by Boundaryless Information Flow™ and is the place in the industry to work on these issues.
6
I3C and The Open Group By working together, the I3C can leverage The Open Group’s work to achieve a vision of a Interoperable, Secure and dependable Informatics Infrastructure Opportunities exist for immediate benefit Architecture Security Directory
7
The Open Group is.. A global consortium committed to delivering greater business efficiency by bringing together buyers and suppliers of information technology to lower the time, cost and risk associated with integrating new technology across the enterprise. Methods Best practices guides Practical guiding principles Frequently found issues and solutions Select and integrate standards Profiles of the standards Proof of concepts Certified products Enterprise architecture method Best practices on business information directory Best practice for information delivery Overall gap and overlap reports Reports on alternative approaches Proof of concept reports Information Infrastructure Business Technical
8
Our Role Ensure requirements derived from real interoperability issues are driving standards (Customer view) Ensure technical direction of interoperability standards are addressing market needs (Supplier view) Enable peers to share best practice and learn from the experiences of others Enable networking with knowledgeable people who are making an impact on the technical direction of IT industry Provide a forum for IT standards with a focus on interoperability Build relationships with other consortia Deliver assurance of interoperability through certification and testing
9
Delivering on the Roles Customers Requirements Business Scenarios & Challenges Policies and best practice Case studies and shared experience Guides Collaborative authoring Tools and methodologies Adopt and adapt Procurement Single organization or combined Suppliers Solutions Through their products Response to requirements Technical direction Standards Adopt, adapt and integrate specifications Technology Sponsor Open Source developments Conformance to standards Established through certification and testing
10
Our Sponsors Sponsors provide over $300 billion worth of IT products world-wide annually Ship significant volume products branded by The Open Group
11
Diverse Membership Members represent a wide range of company sizes, industries and public/private organizations Members have combined IT budgets of over $50 billion annually For example:
12
Relations with Consortia and Other Organizations Austin Group Austin Group Association of Interactive Media Association of Interactive Media Bluetooth SIG Bluetooth SIG Carnegie Mellon University Carnegie Mellon University Center for Internet Security (CIS) Center for Internet Security (CIS) Data Interchange Standards Association Data Interchange Standards Association Database Interoperability Group Database Interoperability Group DCI DCI DMTF DMTF DSML DSML EEMA EEMA Free Standards Group Free Standards Group Global Grid Forum GMD Fokus Group GMD Fokus Group ICX Security ICX Security IEEE PASC IEEE PASC IEEE Standards Association IEEE Standards Association IETF IETF Internet Mail Consortium Internet Mail Consortium IPv6 Forum IPv6 Forum (ISC)2 Information Security Forum (ISF) (ISC)2Information Security Forum (ISF) Internet Security Alliance Internet Security Alliance ISO/IEC SC22 WG15 ISO/IEC SC22 WG15 ITU-T ITU-T J Consortium J Consortium Linux Standards Base Linux Standards Base MPLS Forum MPLS Forum MWIF MWIF NCITS R1 NCITS R1 NAC NAC NIST PCSRF NIST PCSRF OASIS OASIS OMG OMG OSGi OSGi POSC POSC PCCA QoS Forum QoS Forum SAE SAE SNIA SyncML SyncML Telecommunications Industry Association Telecommunications Industry Association TMF TMF UDI Consortium UDI Consortium UDDI UDDI W3C W3C WAP Forum WAP Forum WEMA WEMA X.Org X.Org
13
Services Continuum Management Services Strategy Services Standard s Collaboration & Research Certification & Testing time goals The Open Group Membership NASPL JAVA ICSC IBIX OMP Bluetooth SIG Mobile Directory Secure Messaging WAP MHP LINUX DMTF Management Services Consortia Formation Operations Infrastructure Provision Strategy Services Business Scenarios Architecture development Collaboration & Research Interoperability events Homesteading Research & Innovation Certification & Testing Program development Test development Certification Operations Standards Technical editing Consensus review process Publication
14
Specific Interaction Opportunities Architecture Security Directory
15
Architecture An effective framework Resource Base BBIBSIBTRM ADM Target TOGAF Knowledgeable and professional practitioners Adequate “Commercial Off-The-Shelf” tools TOGAF Tool Support Certification TOGAF Training Certification TOGAF Practitioner Certification TOGAF Prof. Svcs. Certification TOGAF “Enterprise Edition”
16
The “Enterprise Continuum” Foundation Architectures Common Systems Architectures Industry Architectures Organisation Architectures Systems Solutions Industry Solutions Organisation Solutions Products & Services Solutions Continuum Guides & Supports Guides & Supports Guides & Supports Guides & Supports Architecture Continuum
17
“Enterprise” ADM - Key Points A Architecture Vision H Architecture Change Management G Implementation Governance C Information System Architectures Requirements B Business Architecture E Opportunities and Solutions F Migration Planning Prelim : Framework and Principles D Technology Architecture An iterative method Each iteration requires decisions on: Focus - enterprise coverage Time horizon aimed at Architecture assets to be leveraged assets from previous iterations assets available elsewhere (other frameworks, system models, vertical industry models, etc.) Decisions made on practical assessment of: resource / competence availability value expected to accrue to the enterprise
18
Phone Books/Directories Boundaryless Information Flow - Business Taxonomy Mobility Policy Information Provider Management Organization Brokers Development Organization Information Consumers Performance Service Level Manageability Policy Security Policy
19
Qualities Application Platform Boundaryless Information Flow - Technical Taxonomy Mobility Policy Classes of Interfaces - formats and protocols … Information Provider Applications Management Utilities Brokering Applications Development Tools Information Consumer Applications Performance SLAs Manageability Policy Security Policy
20
Qualities Application Platform A Level 2 Model Information Provider Applications Management Utilities Brokering Applications Development Tools Information Consumer Applications Desktop Video Conference information AccessStreaming audio / video Mail Phone / Fax Web Portal Business modeling tools Design tools Construction tools Languages and Libraries Monitors Executory Utilities Copy Managers Mobility PerformanceManageability Security Information Brokers Application Integrators Desktop Video Conference information AccessStreaming audio / video Mail Phone / Fax Web Portal Application to application communications services Directory Referencing/Dereferencing Naming Registration Publish Subscribe Discovery Digital Signature Intrusion Detection Key Management Firewall Encryption AAAC SSO Presentation Transformation Browser services Portal and personalization Meta indices Information Access Transformation Mapping Query distribution Aggregation Search File services Web services Application Messaging Languages Libraries Registries Application Message Format Info Format eForm services Instant messaging services Messaging/Event BrokeringProcess/Workflow Control Enterprise Appl Integration
21
Security
22
Security – our Vision Security is about achieving business objectives within applicable law and policy Managing risk Not merely preventing bad things Security creates protected systems with controlled perimeters A controlled perimeter is “boundaryless” where (and only where) it needs to be Security design is necessarily pervasive
23
Bridge the gap between business objectives and traditional “security” technology Identifygaps in both understanding and technology Better understanding between buyers and suppliers Positioning within the Security Life Cycle – Concept, Requirements, H-L Design, L-L Design, Implementation, Integration, Test & Certification, Operation & Maintenance, Obsolescence & Succession. Develop collaborative activities with other consortia to avoid duplication of effort & leverage best-of-breed solutions A big part of the problem is just defining exactly what problem we’re solving Security – our Mission
24
Directory Interoperability Directory HR Access Control Identity Manage- ment Mobility CRM Provision- ing Single Sign-On Web Services
25
Working Together We’d like to invite the I3C to work with The Open Group to identify and establish standards and best practices in Boundaryless Informatics Architecture Security Policies and Risk Management practices Directory Interoperability
26
In conclusion By engaging with other IT vendors and customers working toward a vision of Boundaryless Information Flow™, the I3C can realize: Faster and simpler identification of necessary interoperability, reliability standards for informatics Faster availability of necessary informatics standards in commercial practice = Faster and more efficient deployment of life science products
27
Thank You Any Questions? Your Name Title Mobile +1 415 999 9999 GSM +44 7771 999999 a.person@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 200 Fax +1 415 374 8293 www.opengroup.org David Lounsbury Vice President Advanced Research & Innovation d.lounsbury@opengroup.org 29B Montvale Ave Woburn, MA 01801 USA Tel +1 781 376 8203 Fax +1 781 376 9358 www.opengroup.org/ar
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.