the open group: an introduction interoperable informatics infrastructure consortium may 6th, 2003...

27
The Open Group: An Introduction Interoperable Informatics Infrastructure Consortium May 6th, 2003 Your Name Title Mobile +1 415 999 9999 GSM +44 7771 999999 [email protected] 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 200 Fax +1 415 374 8293 www.opengroup.org David Lounsbury Vice President Advanced Research & Innovation [email protected] 29B Montvale Ave Woburn, MA 01801 USA Tel +1 781 376 8203 Fax +1 781 376 9358 www.opengroup.org/ar

Upload: silas-harmon

Post on 18-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

The Open Group: An Introduction

Interoperable Informatics Infrastructure Consortium May 6th, 2003

Your NameTitle

Mobile +1 415 999 9999GSM +44 7771 999999

[email protected]

44 Montgomery StreetSuite 960

San Francisco, CA94104 USA

Tel +1 415 374 8280 ext. 200Fax +1 415 374 8293

www.opengroup.org

David LounsburyVice PresidentAdvanced Research & Innovation

[email protected]

29B Montvale AveWoburn, MA01801 USA

Tel +1 781 376 8203Fax +1 781 376 9358

www.opengroup.org/ar

The I3C Mission

I3C develops and promotes global, vendor-neutral informatics solutions that improve data quality and accelerate the development of life science products.

To Achieve the Mission..

Conflicting forces must be balanced to succeed Free information exchange and

IPR Regulatory compliance and

operational efficiency Standardization and

complexity The signs on how to proceed

are not always clear

The I3C is not alone in these challenges!

The Open Group Mission

To drive the creation of Boundaryless Information Flow™ by: Working with customers to capture, understand and address

current and emerging requirements, establish policies and share best practices;

Working with suppliers, consortia and standards bodies to develop consensus and facilitate interoperability, to evolve and integrate open specifications and open source technologies;

Offering a comprehensive set of services to enhance the operational efficiency of consortia; and

Developing and operating the industry's premier certification service and encouraging procurement of certified products.

Boundaryless Information Flow™ To achieve Boundaryless Information Flow™ an

organization needs to put in place infrastructure services that bring information together and provide that information to those users and applications that need it.

Boundaryless Information Flow™ represents a set of challenges that most companies have.

The Open Group is tackling the problems represented by Boundaryless Information Flow™ and is the place in the industry to work on these issues.

Graham Bird
Changed last bullet

I3C and The Open Group

By working together, the I3C can leverage The Open Group’s work to achieve a vision of a Interoperable, Secure and dependable Informatics Infrastructure

Opportunities exist for immediate benefit Architecture Security Directory

The Open Group is ..

A global consortium committed to delivering greater business efficiency by bringing together buyers and suppliers of information technology to lower the time, cost and risk associated with integrating new technology across the enterprise.

Methods Best practices guides Practical guiding principles Frequently found issues and

solutions

Select and integrate standards

Profiles of the standards Proof of concepts Certified products

Enterprise architecture method

Best practices on business information directory

Best practice for information delivery

Overall gap and overlap reports

Reports on alternative approaches

Proof of concept reports

InformationInformation InfrastructureInfrastructure

Bu

sin

eB

us

ine

ssss

Te

ch

nic

Te

ch

nic

alal

Our Role

Ensure requirements derived from real interoperability issues are driving standards (Customer view)

Ensure technical direction of interoperability standards are addressing market needs (Supplier view)

Enable peers to share best practice and learn from the experiences of others

Enable networking with knowledgeable people who are making an impact on the technical direction of IT industry

Provide a forum for IT standards with a focus on interoperability

Build relationships with other consortia Deliver assurance of interoperability through

certification and testing

Delivering on the Roles

CustomersRequirements

Business Scenarios & Challenges

Policies and best practiceCase studies and shared experience

GuidesCollaborative authoring

Tools and methodologiesAdopt and adapt

ProcurementSingle organization or combined

SuppliersSolutions

Through their productsResponse to requirements

Technical directionStandards

Adopt, adapt and integrate specifications

TechnologySponsor Open Source developments

Conformance to standardsEstablished through certification and testing

Our Sponsors

Sponsors provide over $300 billion worth of IT products world-wide annually

Ship significant volume products branded by The Open Group

Diverse Membership

Members represent a wide range of company sizes, industries and public/private organizations

Members have combined IT budgets of over $50 billion annually

For example:

Relations with Consortia and Other Organizations Austin Group Association of Interactive Media Bluetooth SIG Carnegie Mellon University Center for Internet Security (CIS) Data Interchange Standards Association Database Interoperability Group DCI DMTF DSML EEMA Free Standards Group Global Grid Forum GMD Fokus Group ICX Security IEEE PASC IEEE Standards Association IETF Internet Mail Consortium IPv6 Forum (ISC)2 Information Security Forum (ISF) Internet Security Alliance ISO/IEC SC22 WG15 ITU-T

J Consortium Linux Standards Base MPLS Forum MWIF NCITS R1 NAC NIST PCSRF OASIS OMG  OSGi POSC PCCA QoS Forum SAE SNIA SyncML Telecommunications Industry Association TMF UDI Consortium UDDI W3C WAP Forum WEMA X.Org

Services Continuum

Management Services

StrategyServices

Standards

Collaboration& Research

Certification& Testing

time

goals

The Open Group Membership

NASPL

JAVAICSC

IBIX IBIX

OMP

Bluetooth SIG

Mobile Directory Secure Messaging

WAP MHP

LINUX DMTF

Management Services Consortia Formation Operations Infrastructure Provision

Strategy Services Business Scenarios Architecture development

Collaboration& Research

Interoperability events Homesteading Research & Innovation

Certification & Testing Program development Test development Certification Operations

Standards Technical editing Consensus review process Publication

Specific Interaction Opportunities Architecture Security Directory

Architecture

An effective frameworkResource Base

BBIBSIBTRM

ADM

Target

TOGAF

Knowledgeable and professional practitioners

Adequate “Commercial Off-The-Shelf” toolsTOGAF Tool Support Certification

TOGAF Training Certification TOGAF Practitioner Certification TOGAF Prof. Svcs. Certification

TOGAF “Enterprise Edition”

The “Enterprise Continuum”

FoundationArchitectures

Common SystemsArchitectures

Industry Architectures

Organisation Architectures

SystemsSolutions

IndustrySolutions

OrganisationSolutions

Products &Services

Solutions Continuum

Guides &Supports

Guides &Supports

Guides &Supports

Guides &Supports

Architecture Continuum

“Enterprise” ADM - Key Points

AArchitecture

VisionH Architecture

Change Management

G Implementation

Governance

CInformation

System Architectures

Requirements

BBusiness

Architecture

EOpportunitiesand Solutions

F MigrationPlanning

Prelim: Framework and

Principles

DTechnology Architecture

An iterative methodEach iteration requires decisions on:

Focus - enterprise coverageTime horizon aimed atArchitecture assets to be leveraged

assets from previous iterationsassets available elsewhere (other frameworks, system models, vertical industry models, etc.)

Decisions made on practical assessment of:

resource / competence availabilityvalue expected to accrue to the enterprise

Phone Books/Directories

Boundaryless Information Flow - Business Taxonomy

Mobility Mobility PolicyPolicy

Information Provider

ManagementOrganization

BrokersDevelopmentOrganization

Information Consumers

Performance Service LevelPerformance Service Level Manageability PolicyManageability Policy

Security PolicySecurity Policy

Qualities

Qualities

Application Platform

Boundaryless Information Flow - Technical Taxonomy

Mobility Mobility PolicyPolicy

Classes of Interfaces - formats and protocols …

Information Provider Applications

ManagementUtilities

Brokering Applications

DevelopmentTools

Information Consumer Applications

Performance SLAsPerformance SLAs Manageability PolicyManageability Policy

Security PolicySecurity Policy

Qualities

Qualities

Application Platform

A Level 2 Model

Information Provider Applications

Management Utilities

Brokering Applications

Development Tools

Information Consumer Applications Desktop Video Conference

information AccessStreaming audio / video Mail Phone / Fax

Web Portal

Business modeling toolsDesign tools

Construction toolsLanguages and Libraries

MonitorsExecutory Utilities

Copy Managers

MobilityMobility

PerformancePerformance ManageabilityManageability

SecuritySecurity

Information BrokersApplication Integrators

Desktop Video Conference

information AccessStreaming audio / video Mail Phone / Fax

Web Portal

Application to application communications services

DirectoryReferencing/Dereferencing

NamingRegistration

PublishSubscribeDiscovery

Digital SignatureIntrusion DetectionKey ManagementFirewallEncryptionAAACSSO

PresentationTransformation

Browser servicesPortal and personalization

Meta indices

Information AccessTransformation Mapping

Query distributionAggregation

Search File services

Web services

Application MessagingLanguages LibrariesRegistries

Application Message Format

Info FormateForm services

Instant messaging services

Messaging/Event Brokering Process/Workflow Control

Enterprise Appl Integration

Security

Security – our Vision

Security is about achieving business objectives within applicable law and policy Managing risk Not merely preventing bad things

Security creates protected systems with controlled perimeters A controlled perimeter is “boundaryless”

where (and only where) it needs to be Security design is necessarily pervasive

Bridge the gap between business objectives and traditional “security” technology Identifygaps in both understanding and technology Better understanding between buyers and suppliers Positioning within the Security Life Cycle – Concept,

Requirements, H-L Design, L-L Design, Implementation, Integration, Test & Certification, Operation & Maintenance, Obsolescence & Succession.

Develop collaborative activities with other consortia to avoid duplication of effort & leverage best-of-breed solutions

A big part of the problem is just defining exactly what problem we’re solving

Security – our Mission

Directory Interoperability

Directory

HR

Access Control

Identity Manage-

ment

MobilityCRM

Provision-ing

Single Sign-On

Web Services

Graham Bird
Removed logo

Working Together

We’d like to invite the I3C to work with The Open Group to identify and establish standards and best practices in Boundaryless Informatics Architecture Security Policies and Risk Management

practices Directory Interoperability

In conclusion By engaging with other IT vendors and

customers working toward a vision of Boundaryless Information Flow™ , the I3C can realize: Faster and simpler identification of necessary

interoperability, reliability standards for informatics

Faster availability of necessary informatics standards in commercial practice

= Faster and more efficient deployment of life science products

Thank You

Any Questions?

Your NameTitle

Mobile +1 415 999 9999GSM +44 7771 999999

[email protected]

44 Montgomery StreetSuite 960

San Francisco, CA94104 USA

Tel +1 415 374 8280 ext. 200Fax +1 415 374 8293

www.opengroup.org

David LounsburyVice PresidentAdvanced Research & Innovation

[email protected]

29B Montvale AveWoburn, MA01801 USA

Tel +1 781 376 8203Fax +1 781 376 9358

www.opengroup.org/ar