The Open Group Corporate Overview

Download Report

Transcript The Open Group Corporate Overview

The Open Group:
An Introduction
Interoperable Informatics Infrastructure
Consortium
May 6th, 2003
Your Name
David Lounsbury
Title
44 Montgomery Street
29B Montvale
Ave
Suite 960
Woburn,CA
MA
San Francisco,
01801
USA
94104 USA
Vice President
Advanced
Research
& Innovation
Mobile
+1 415
999 9999
GSM +44 7771 999999
781ext.
376200
8203
Tel +1 415 Tel
374+1
8280
Fax
+1
781
376
9358
Fax +1 415 374 8293
[email protected]
www.opengroup.org/ar
www.opengroup.org
[email protected]
The I3C Mission

I3C develops and promotes global, vendorneutral informatics solutions that improve
data quality and accelerate the development
of life science products.
To Achieve the Mission..

Conflicting forces must be
balanced to succeed
 Free information exchange
and IPR
 Regulatory compliance and
operational efficiency
 Standardization and
complexity

The signs on how to proceed
are not always clear
The I3C is not alone in these challenges!
The Open Group Mission
To drive the creation of Boundaryless
Information Flow™ by:
 Working with customers to capture, understand and address
current and emerging requirements, establish policies and share
best practices;
 Working with suppliers, consortia and standards bodies to
develop consensus and facilitate interoperability, to evolve and
integrate open specifications and open source technologies;
 Offering a comprehensive set of services to enhance the
operational efficiency of consortia; and
 Developing and operating the industry's premier certification
service and encouraging procurement of certified products.
Boundaryless Information
Flow™



To achieve Boundaryless Information Flow™ an
organization needs to put in place infrastructure
services that bring information together and provide
that information to those users and applications that
need it.
Boundaryless Information Flow™ represents a set of
challenges that most companies have.
The Open Group is tackling the problems represented
by Boundaryless Information Flow™ and is the
place in the industry to work on these issues.
I3C and The Open Group


By working together, the I3C can
leverage The Open Group’s work to
achieve a vision of a Interoperable,
Secure and dependable Informatics
Infrastructure
Opportunities exist for immediate
benefit
 Architecture
 Security
 Directory
The Open Group is ..
A global consortium committed to delivering greater
business efficiency by bringing together buyers and
suppliers of information technology to lower the time,
cost and risk associated with integrating new technology
across the enterprise.
Infrastructure
Information
Business





Technical



Methods
Best practices guides
Practical guiding principles
Frequently found issues and
solutions

Overall gap and overlap
reports
Reports on alternative
approaches
Proof of concept reports






Enterprise architecture
method
Best practices on business
information directory
Best practice for information
delivery
Select and integrate standards
Profiles of the standards
Proof of concepts
Certified products
Our Role







Ensure requirements derived from real interoperability
issues are driving standards (Customer view)
Ensure technical direction of interoperability standards
are addressing market needs (Supplier view)
Enable peers to share best practice and learn from the
experiences of others
Enable networking with knowledgeable people who are
making an impact on the technical direction of IT
industry
Provide a forum for IT standards with a focus on
interoperability
Build relationships with other consortia
Deliver assurance of interoperability through
certification and testing
Delivering on the Roles
Customers
Requirements
Business Scenarios &
Challenges
Policies and best practice
Case studies and
shared experience
Guides
Collaborative authoring
Tools and methodologies
Adopt and adapt
Procurement
Single organization or
combined
Suppliers
Solutions
Through their products
Response to requirements
Technical direction
Standards
Adopt, adapt and
integrate specifications
Technology
Sponsor Open Source
developments
Conformance to standards
Established through
certification and testing
Our Sponsors


Sponsors provide over $300 billion
worth of IT products world-wide
annually
Ship significant volume products
branded by The Open Group
Diverse Membership



Members represent a wide range of company sizes,
industries and public/private organizations
Members have combined IT budgets of over $50 billion
annually
For example:
Relations with Consortia and
Other Organizations
























Austin Group
Association of Interactive Media
Bluetooth SIG
Carnegie Mellon University
Center for Internet Security (CIS)
Data Interchange Standards Association
Database Interoperability Group
DCI
DMTF
DSML
EEMA
Free Standards Group
Global Grid Forum
GMD Fokus Group
ICX Security
IEEE PASC
IEEE Standards Association
IETF
Internet Mail Consortium
IPv6 Forum
(ISC)2 Information Security Forum (ISF)
Internet Security Alliance
ISO/IEC SC22 WG15
ITU-T
























J Consortium
Linux Standards Base
MPLS Forum
MWIF
NCITS R1
NAC
NIST PCSRF
OASIS
OMG
OSGi
POSC
PCCA
QoS Forum
SAE
SNIA
SyncML
Telecommunications Industry Association
TMF
UDI Consortium
UDDI
W3C
WAP Forum
WEMA
X.Org
Services Continuum
Certification
Management
Strategy
Collaboration
Standards
Services
&
Services
Testing
IBIX
& Research

Consortia
Business
Program
Technical
development
Scenarios
editing
Formation


goals

IBIX
Consensus
Operations
Architecture
Interoperability
Test
development
review
development
events
process
Infrastructure
Homesteading
Certification
Publication
Operations
Provision
Research & Innovation
WAP
Standard
s
NASPL
Collaboration
& Research
ICSC
OMP
Certification
& Testing
LINUX DMTF
JAVA
Strategy
Secure Messaging
Services Mobile Directory
Bluetooth SIG
Management
Services
The Open Group Membership
time
MHP
Specific Interaction
Opportunities



Architecture
Security
Directory
Architecture
Target

An effective
TOGAF
“Enterpriseframework
Edition”
ADM
TRM
SIB
BBIB
Resource Base
TOGAF
TOGAF Training
Knowledgeable
andCertification
professional
TOGAF Practitioner Certification
practitioners
TOGAF Prof. Svcs. Certification
Adequate “Commercial Off-The-Shelf”
TOGAF
Tool Support Certification
tools
The “Enterprise Continuum”
Architecture Continuum
Foundation
Architectures
Common Systems
Architectures
Guides &
Supports
Guides &
Supports
Products &
Services
Solutions Continuum
Industry
Architectures
Guides &
Supports
Systems
Solutions
Organisation
Architectures
Guides &
Supports
Industry
Solutions
Organisation
Solutions
“Enterprise” ADM Key Points
Prelim:
Framework and
Principles
An iterative method
Each iteration requires decisions on:
Focus - enterprise coverage
Time horizon aimed at
Architecture assets to be leveraged
assets from previous iterations
assets available elsewhere (other
frameworks, system models, vertical
industry models, etc.)
Decisions made on practical assessment
of:
resource / competence availability
value expected to accrue to the enterprise
A
H
Architecture
Vision
Architecture
Change
Management
B
Business
Architecture
C
G
Implementation
Governance
Requirements
F
Migration
Planning
Information
System
Architectures
D
E
Opportunities
and Solutions
Technology
Architecture
Boundaryless Information
Flow - Business Taxonomy
Security Policy
Mobility Policy
Phone Books/Directories
Information Consumers
Development
Organization
Brokers
Management
Organization
Information Provider
Performance Service Level
Manageability Policy
Boundaryless Information
Flow - Technical Taxonomy
Security Policy
Qualities
Mobility Policy
Application Platform
Information Consumer Applications
Development
Tools
Brokering
Applications
Management
Utilities
Information Provider Applications
Performance SLAs

Qualities
Manageability Policy
Classes of Interfaces - formats and protocols …
A Level 2 Model
Security
Qualities
Mobility
Application Platform
Information Consumer Applications
Web Portal
Streaming audio / video
Languages Libraries
Registries
information Access
Directory
Referencing/Dereferencing
Naming
Registration
Publish
Subscribe
Discovery
Phone / Fax
Mail
Application Message Format
Application Messaging
Application to application
communications services
Enterprise Appl Integration
Development
Tools
Brokering
Applications
Business modeling tools
Design tools
Construction tools
Languages and Libraries
Information Brokers
Application Integrators
Digital Signature
Intrusion Detection
Key Management
Firewall
Encryption
AAAC
Web Portal
SSO
Streaming audio / video
Desktop Video Conference
Presentation
Transformation
Browser services
Portal and personalization
Meta indices
Management
Utilities
Monitors
Executory Utilities
Copy Managers
Information Access
Transformation Mapping
Query distribution
Aggregation
Search
File services
Desktop Video Conference
Web services
Phone / Fax
Info Format
eForm services
Instant messaging
services
Information Provider Applications
information Access
Messaging/Event Brokering
Performance
Mail
Process/Workflow Control
Qualities
Manageability
Security
Security – our Vision

Security is about achieving business
objectives within applicable law and
policy
 Managing risk
 Not merely preventing bad things

Security creates protected systems with
controlled perimeters
 A controlled perimeter is “boundaryless”
where (and only where) it needs to be

Security design is necessarily pervasive
Security – our Mission

Bridge the gap between business objectives
and traditional “security” technology
 Identifygaps in both understanding and technology
 Better understanding between buyers and suppliers
 Positioning within the Security Life Cycle – Concept,
Requirements, H-L Design, L-L Design,
Implementation, Integration, Test & Certification,
Operation & Maintenance, Obsolescence &
Succession.


Develop collaborative activities with other
consortia to avoid duplication of effort &
leverage best-of-breed solutions
A big part of the problem is just defining
exactly what problem we’re solving
Directory Interoperability
Web
Services
Access
Control
Directory
CRM
Provisioning
Identity
Management
Mobility
Single
Sign-On
HR
Working Together

We’d like to invite the I3C to work with
The Open Group to identify and
establish standards and best practices
in
 Boundaryless Informatics Architecture
 Security Policies and Risk Management
practices
 Directory Interoperability
In conclusion

By engaging with other IT vendors and
customers working toward a vision of
Boundaryless Information Flow™ ,
the I3C can realize:
 Faster and simpler identification of necessary
interoperability, reliability standards for
informatics
 Faster availability of necessary informatics
standards in commercial practice
= Faster and more efficient deployment
of life science products
Thank You
Any Questions?
Your Name
David Lounsbury
Title
44 Montgomery Street
29B Montvale
Ave
Suite 960
Woburn,CA
MA
San Francisco,
01801
USA
94104 USA
Vice President
Advanced
Research
& Innovation
Mobile
+1 415
999 9999
GSM +44 7771 999999
781ext.
376200
8203
Tel +1 415 Tel
374+1
8280
Fax
+1
781
376
9358
Fax +1 415 374 8293
[email protected]
www.opengroup.org/ar
www.opengroup.org
[email protected]