Home > Store

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

Register your product to gain access to bonus material or receive a coupon.

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2002
  • Dimensions: 7-3/8x9-1/4
  • Pages: 384
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-76730-9
  • ISBN-13: 978-0-201-76730-8

How do forward-thinking IT professionals organize infrastructure and staff to meet the challenges of e-Business value chain initiatives head-on? Enriching the Value Chain gives you the answers:

  • Strategic advice for mapping business drivers to a set of fundamental patterns and planning models.
  • A way to organize e-Business infrastructure with your suppliers, trading partners, and customers.
  • How to run e-Business infrastructure services for the long term with high quality.
  • How to make applications become easier, more cost-effective, and quicker to integrate.

Picking up where The Adaptive Enterprise leaves off, this companion volume tells you how to achieve success in value chain infrastructure planning.



0201767309B02082002

Sample Content

Online Sample Chapter

Beyond e-Business: Infrastructure Strategies that Will Enrich Your Value Chain

Downloadable Sample Chapter

Click below for Sample Chapter related to this title:
robertsonch1.pdf

Table of Contents

(NOTE: Each chapter concludes with a Summary.)

Preface.


1 Beyond e-Business.

Why Infrastructure (Suddenly) Matters.

Getting It Right.

The Importance of Being Adaptive.

The Clash of Cultures.

What's the Solution?

Understanding Adaptive Infrastructure.

Measuring the Benefits.



2 Laying the Foundation.

How to Catalog Components.

Physical Components.

Functional Components.

Interface Components.

Other Components?

Other Layers?

Developing Adaptive Services.

Understanding the Concept.

Applying the Model.

Benefits of Adaptive Infrastructure Services.

Shifting Services to the Infrastructure.

Decoupling the Lifecycles.

Examining the Network Model.

Service Interfaces and Service Level Agreements.

Where to Create Service Boundaries.

Keeping it Real.

Design Guidelines.

How to Apply Services to New Applications.



3 Identifying and Using Patterns.

What Are Patterns?

Designing for the Future.

Asking Who, Where, and What?

How Detailed Should It Get?

Understanding the Major Patterns.

Transact Patterns.

Publish Patterns.

Collaborate Patterns.

Key Patterns for e-Business.

Web Publish Pattern.

3/N-Tier Transact Pattern.

What Patterns Do You Need?

Subdividing Patterns.

Should Patterns for e-Business Be Different?

Applying Multiple Patterns.



4 Infrastructure Planning and Design.

The Business/IT Project Lifecycle.

Step 1: Setting Strategy.

Step 2: Choosing Strategic Activities.

Step 3: Matching Activities to Patterns.

Step 4: Refining Patterns and Project Plans.

Step 5: Implementing and Operating.

The Importance of People Skills.

Assessing the Skills Required.

Increased Pressure to Deliver.

New Types of Relationships.

Developing Relationship-based Management.

New Business Roles.

Effective Recruiting.

Retaining Employees.

Understanding Infrastructure Planning.

Details of Project Planning.

Packaging Infrastructure.

Designing Patterns.



5 Security Services.

Isolation Infrastructure Service.

Understanding Firewalls.

Architecting the Demilitarized Zone (DMZ).

Intrusion Detection and Threat Management.

SSL and Encryption Hardware.

Refining Pattern Designs for Isolation Infrastructure.

Identity Infrastructure Service.

Web SSO: Simple Web-Centric Authentication.

Public Key Infrastructure (PKI).

Directory Server.

Building a Complete Identity Infrastructure.

Refining Pattern Designs in Identity Infrastructure.



6 Physical Components.

Network Layer.

Overview of Networking Technologies.

Scale-Out Design for Performance and Availability.

Network Load Balancer.

Caching Server.

Content Delivery Network (CDN).

Internet Access and Transport Services.

Extranet Service Providers (ESPs).

Hosting Services.

Refining Patterns in the Network Layer.

Storage Layer.

Storage Area Network Interconnect.

Network Attached Storage Solutions (NAS).

Backup/Recovery Architectures.

Storage Options in the Server Layer.

Refining Patterns in the Storage Layer.

Server Layer.

Server Evolution.

Scale-Up Versus Scale-Out.

Scaling Out Web Services.

Server Consolidation.

Refining Patterns in the Server Layer.



7 Functional Components.

Database Layer.

Important Design Issues.

Trends in Database Technologies.

Scale-Out Solutions and Clustered Database Options.

Refining Patterns in the Database Layer.

Integration Layer.

The Integration Server (Message Broker).

The Inter-Enterprise Integration (IEI) Server.

Refining Patterns in the Integration Layer.

Application Server Layer.

Understanding Application Servers.

Choosing Application Servers.

.NET versus J2EE.

Refining Patterns in the Application Server Layer.



8 Interface and Management Components.

Presentation Layer.

Web Server.

Wireless Application Protocol (WAP) Server.

Wireless Service.

Voice.

Interactive Voice Response (IVR).

Refining Patterns in the Presentation Layer.

API Layer.

Understanding APIs.

Refining Patterns in the API Layer.

Management Layer.

Service Level Management (SLM).

Web Application Monitoring Strategy.

A Note on Metrics.

Refining Patterns in the Management Layer.

Using a Test Lab to Increase Performance.



Appendix A. Component Catalog.

Index to Components.



Glossary.


Index. 0201767309T01242002

Preface

Competition in the future, even today in certain industries, will not be company against company but supply chain against supply chain. Companies will be only as strong as the weakest link in their supply chain. The winners will be companies that can build electronic B2B relationships rapidly and manage those relationships seamlessly.

To cope in this new world, businesses need more agility. But to get this agility, they need a well-designed IT infrastructure that is highly reusable and adaptive. An agile, adaptive infrastructure can help businesses turn on a dime and capture new opportunities as they arrive.

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise explains how adaptive infrastructure techniques can create a more focused, organized approach to delivering and supporting high-agility applications for e-Business and beyond. Along the way, the book recommends best practices for dealing with architecture and technology issues within the infrastructure in a way that can lead to success.

Moreover, the book highlights the e-Business-centric infrastructure strategies that will become key internal strategies as well. The days of separate e-Business infrastructure design and delivery are waning, to be replaced by more codependent and jointly developed internal and external infrastructure solutions.

From an infrastructure perspective, the "e" is actually disappearing so that e-Business will become just plain business. Soon, creating a design for inter-nal corporate infrastructure will involve nothing more than dropping a few requirements from high-level e-Business designs. If these internal solutions later need to be reused externally, the infrastructure will already be in place for a simple incremental upgrade to the e-Business level. And e-Business infrastructure will not be all that different from what we now think of as traditional enterprise computing.



0201767309P01242002

Index


active directory services (ADS) 158
active server pages (ASP) 61
adaptability 20
adaptive cost 110
adaptive infrastructure 4
    selling it to upper management 18
adaptive infrastructure services 38
administration
    centralized and automated 143
agility 33, 39
    creating 40
analysis
    clickstream 291
    pattern analysis 222
    pattern-based 29
    root-cause 132, 293
appliances
    vs. switch-based products 172
application
    implementing and maintaining 88
application hosting 193
application management 198, 291
    planning 295
application programming interface (API) 32, 77, 92, 283
    understanding APIs 285
application programming interface layer 33
application server 220
application server layer 31
application service provider (ASP) 14, 103, 198
application subscriptions 103
application(s)
    externalization 207
applications
    extranet 154
    HTTP 135
    integrating 5
    Web-centric 139, 143
assets
    behind-the-wall 102
authentication 157
    cookie-based 142
    vs. authorization/b 150
authorization 150
automatic locator information (ALI) 280

bleeding edge 5
border gateway protocol (BGP) 174, 190
buffers 131
business
    negiotiating with 110
business vision refinement 101
business-to-business (B2B) 3, 135, 149, 193, 280
    integration of 5
business-to-consumer (B2C) 195, 280
business-to-employee (B2E) 195

cache
    cache server 175
    forward cache 176
    proxy cache 176
    reverse caching 181
centers of excellence (COE) 89
certificate authority (CA) 147
certificate revocation list (CRL) 153
clusters 170
commercial off the shelf (COTS) 274
Communications Assistance for Law Enforcement Act (CALEA) 280
components
    cataloging 24
    identifying and cataloging 12
    organizing infrastructure 51
computer telephony integration (CTI) 32
consultants
    using them 8
content delivery network (CDN) 67, 73, 168, 179, 182, 208
corporate connectivity 189
cryptographic acceleration 138
customer expectations
    managing 290
customer interaction center (CIC) 206, 308
customer relationship management (CRM) 78, 283

data warehousing 28, 74
database layer 28
database management systems (DBMS) 128
decoupling 43, 46
defense in-depth 128
delegated administration 157
demilitarized zone (DMZ) 77, 120, 179, 277, 291
    extended vs. traditional 121
    multi-site 124
    parallel 124
design guidelines 48
digital receipts 149
digital signature 149
directory
    primary purpose of 158
directory server 153
directory service agent (DSA) 154
directory service markup language (DSML) 160
directory user agent (DUA) 154
distributed servers 183
DMZ Sandwich 122
dynamic link library (DLL) 42

e-Business 14, 23, 26, 148, 154, 206
    converging with business 92
    expectations of 1
    goal of 116
    hype vs. reality 2
    rapid ascendance of 31
e-Commerce 56, 154, 173
    consumer-centric 145
Edge Side Includes (ESI) 185
electronic document interchange (EDI) 5
encryption 132
enterprise application integration (EAI) 30, 77, 126, 155, 207
enterprise resource planning (ERP) 60, 158
enterprise systems management (ESM) 133
ethernet 167
expertise
    advanced ISP services 190
extensible markup language (XML) 5, 41, 71, 158, 174, 205, 221, 275
extensible stylesheet language transformations (XSLT) 75
extranet 193
extranet service provider (ESP) 193

fault tolerance 123, 125, 177
feedback system 295
Fibre Channel 209, 212, 218
file transfer protocol (FTP) 48
firewall 116, 138
    application proxy 116
    clusters 123
    dual 122
    serial, or DMZ Sandwich 122
    single 122
    stateful packet filtering 117
flash crowds 186, 202
full-time equivalent (FTE) 134

gap analysis 87
gateway
    SQL 47
gateways 28, 142
Global 2000 145
Global Positioning System (GPS) 280
graphical user interface (GUI)
    improving off-the-shelf 144

hackers 116, 121, 129, 133, 138, 148, 152
host pattern 60
host-based agents 131
hypertext markup language (HTML) 274, 275
hypertext transfer protocol (HTTP) 71
identity infrastructure
    purposes of 160
Infra-API 34
    understanding 287
infrastructure 7
    definition of 6
    identity vs. permission 159
    infrastructure patterns 27
    integration, reuse of 20
    organizing at the platform level 23
    permission vs. identity 162
    physical 198
    raw 23
    strategies 9
Infrastructure Pattern Matching (IPM) 14, 56, 83, 88, 90, 105
infrastructure planning 156
    strategic vs. tactical 15
inputs, tools, outputs, services (ITOS) 98
instant messaging 68
integrated agents 131
integrated development environment (IDE) 287
integrated threat management (ITM) 133
integrated voice response (IVR) 285
integration layer 30
Interactive Voice Response (IVR) 5, 32, 274, 282
Inter-API 34, 288
    understanding 288
inter-enterprise integration (IEI) 30
interfaces
    creating 48
Internet Protocol (IP) 282
Internet service provider (ISP) 14, 186
    consolidation of 204
Intra-API 34, 288
    understanding 287
intrusion detection system (IDS) 116, 128, 138
    network-based vs. host-based 129
IP multi-protocol label switching (MPLS) 190
IP transport 193
isolation infrastructure service 121
    definition of 115
isolation infrastructure service/b 116

J2EE 220
Java server pages (JSP) 61

key history management 147
key management 152
key pair 146
knowledge management 28
layer
    management 289
    presentation layer 274
layers 23
    creating separate 35
    organizing components into 24
legacy platforms 225
legacy systems
    integrating 5
lifecycles
    decoupling 40
lightweight directory access protocol (LDAP) 139, 154
    load balancing 138, 168
    load sharing 168
local area network (LAN) 166

manageability
    as factor in reverse caches 179
managed security service (MSS) 133
management
    data quality 157
marketing
    runaway campaigns 202
metadirectories 155
metadirectory 158
middleware 28
mobile application server (MAS) 274, 275
Mooreís Law 219

network architecture 189
network attached storage (NAS) 206, 209
network IDS
    limitations of 131
network infrastructure 167
network latency 173
network layer 55
    best practices 208
network load balancer (NLB) 125, 135, 140, 168, 170, 173
    advantages of 172
    integrating SSL into 137
network operating system (NOS) 69, 154, 161
network traffic
    minimizing 76
networking 203
nodes
    importance of 189
non-repudiation 194
notifications
    attack 132

online analytical processing (OLAP) 64
online data stores (ODS) 74
online transaction processing (OLTP) 60, 73, 74, 168
operating system (OS) 225
organizations
    Global 2000 133
OSI stack 137
outsourcing 5, 21, 67, 74, 90, 104, 155, 192, 201, 203, 208, 276
    hosting services 195
    outsourcing patterns 50
ownership
    establishing 45

package and communicate 101
package pricing 104
partitioning 20
pattern
    1-Tier Transact 60
    2-Tier Transact 61, 126
    3/N-Tier Transact 29, 32, 63, 75, 122, 126, 127, 138, 168, 182, 192, 201, 220, 289
    Client/Server 63
    combination of Publish and Transact 74
    designing 104
    linking patterns with services 88
    maturity 58
    pattern design 201
    pattern refinement 88
    phasing out old 225
    Real-Time Collaborate 68
    refined 112
    scalability of a pattern as deciding factor 57
    selecting a pattern 111
    Store-and-Forward Collaborate 69, 80, 223
    Stream Publish 66, 220
    Structured Collaborate 70
    Web Publish 29, 50, 65, 71, 122, 137, 168, 182, 192, 216, 220
patterns 11, 23, 53
    defining 11
    identifying modular 13
PCI cards
    accelerating site performance 136
peering points 190, 194
performance drag
    minimizing 135
permissions management 150, 194
personal computer interface (PCI) 135
personal digital assistant (PDA) 5, 277
personal identification number (PIN) 152
planning
    assimilation 101
    per-project 100
    strategic, or periodic 98
    tactical, or per-project 98
platform 11, 23
point of interaction (POI) 208
    multiple 76
points of interaction (POI) 33, 119, 275
    multiple 90
points-of-interaction (POI) 56
policy
    compliance 133
portfolios 16
Predictive Cost Modeling (PCM) 83, 88, 106
presentation 77
presentation independence 19
presentation layer 32
private key infrastructure (PKI) 139
process 112
    getting the process defined 89
process model 45
process(es)
    repeatable 15
provider viability 191
public key encryption (PKI) 134
public key infrastructure (PKI) 146, 194
public safety access center (PSAC) 281

quality of service (QoS) 202, 205

redundant array of independent disks (RAID) 169
relationship-based management (RBM) 94
reliability vs. performance 174
request for proposal (RFP) 145
resource(s)
    dedicated 89
return on investment (ROI) 8, 80
reuse 20, 34, 42, 56, 92, 139, 146, 149, 156, 171
    reuse challenges 151
reverse proxies 179
risk management 118
robots 291
role
    application developer 17, 34, 46
    assigning roles 89
    business analyst 287
    business manager 87
    chief customer officer 96
    chief information officer (CIO) 86
    chief security officer 96
    chief technical officer (CTO) 96
    chief technology officer (CTO) 86
    infrastructure developer 17, 92, 102, 108, 287
     infrastructure manager 87
    infrastructure planner 9, 14, 20, 30, 74, 90, 165
    internal partner manager 96
    IT director 293
    programmer 34
    relationship manager 95
    vendor and sourcing manager 96
role identifiers 158
router 116
router hops 173
rule
    80/20 80

scalability 19, 72, 77, 125, 140, 142, 166, 170, 175, 220
    challenges of 152
    low-cost 168
    single-server 154
scale-out 165
    as architectural trend 274
scaling
    scaling up vs. scaling out 220
SCSI 209
secure HTTP 135
secure socket layer (SSL) 134, 147
secure sockets library (SSL) 73, 168
security 74, 77, 204
security assertion markup language (SAML) 145
server
    database 215
server cluster 172
server farm 169
server layer 27
server(s)
    server consolidation 221
    types of 221
service level
    defining 106
service level agreement (SLA) 204, 290, 292
service level agreements (SLA)
    negotiating 199
service level management (SLM) 289, 290
service levels 20, 39
    defining 48
service(s) 11, 18, 23
    adaptive 37
    bundling 198
    consumer 43
    creating 36
    decoupling 14
    defining adaptive infrastructure service 51
    defining service levels 45
    desktop 103
    externalizing 91
    full interface 43
    interface 43
    keeping the number low 46
    non-repudiation/b 149
    project 104
    provider 43
    security and directory 194
    Web edge 175
sharing 38
Simple Mail Transfer Protocol (SMTP) 205
Simple Network Management Protocol (SNMP) 134
Simple Object Access Protocol (SOAP) 41, 205, 221
single instance 214
single point of administration (SPA) 144
Single Sign-On (SSO) 140, 148
smart cards 151
smart PC 20, 61, 63
software development kit (SDK) 288
solution(s)
    bundling 146
SQLNet 63
SSL session ID 173
stability 38
Storage Area Network (SAN) 26, 206
    comparing with network-attached storage (NAS) 210
storage layer 206
stovepipes 11, 20, 54
    removing 14
    vs. adaptive infrastructure 42
strategy
    vs. strategic activities 87
supply chain management (SCM) 78
supply-side caching 138
switching 132
system partitioning 170

TCP/IP 14, 25, 42, 55, 68, 81, 205, 209
    definition of 166
test lab 296
threat management 133
tools
    Bluetooth 278
    Check Point FireWall-1 117
    CICS 34
    Cisco PIX 117
    ColdFusion 61
    COM+/.NET 34
    Excel 69
    Forte 34
    freeware tools 120
    Haht 61
    J2EE 31, 34
    Kerberos 146
    metadirectory 155
    Microsoft IIS 126
    Microsoft Money 16
    Microsoft Windows 2000/.NET Server 31
    NetMeeting 68
    Passport 152
    Peoplesoft 63
    PowerBuilder 34, 61
    Quicken 16
    Real Application Cluster (RAC) 79
    RealPlayer 66
    SAP R/3 63
    Tuxedo 34
    Visual Basic 61
    WebLogic 31
    WebSphere 31
    Windows 2000/.NET 143
    Windows Media Player 66
    Word 69
total cost of ownership (TCO) 107, 119
    lowering 224
traditional DMZ 121
transactional systems 169
transactions per second (TPS) 135
trust
    challenges of 152

Universal Description, Discovery, and Integration (UDDI) 41, 205, 221
UNIX 212, 218
usability 132

videoconferencing 68
virtual private network (VPN) 25, 116, 167
voice markup language (VoxML) 275
voice messaging 28
Voice Over Internet (VoIP) 68, 281
voice response unit (VRU) 306

Web hosting 202
web management 291
Web server 121, 141, 154, 157, 169, 171, 172, 173, 202, 213, 215, 274
Web Services Description Language (WSDL) 41, 205, 221
Web Single Sign-On (Web SSO) 77, 139, 142, 145, 153, 154, 159, 162, 180, 194
wide area network (WAN) 166
Windows 2000/.NET 212, 218
wireless application protocol (WAP) 32, 274, 275, 277
wireless application server provider (WASP) 274, 276, 280, 281
wireless markup language (WML) 275

XML query language (XQL) 75

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership