Hausman | Sustainable Enterprise Architecture | E-Book | www.sack.de
E-Book

E-Book, Englisch, 304 Seiten

Hausman Sustainable Enterprise Architecture


1. Auflage 2011
ISBN: 978-1-4398-2155-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 304 Seiten

ISBN: 978-1-4398-2155-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.

Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.

The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.

Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.

Hausman Sustainable Enterprise Architecture jetzt bestellen!

Zielgruppe


IT managers, network planners, and operations managers.


Autoren/Hrsg.


Weitere Infos & Material


The Impact of Enterprise Architecture
Simple Choice, Complex Impact A Strong Hand Opportunity Costs Ripples in the Pond

Where the Only Constant Is Change Lilliput and Blefuscu Open Source and Open Standards

The Best Solution

Enterprise Planning

Beyond Platform Selection

Where Lies Success?

The Architect The Chief Architect The Lead Architect The Business Architect The Technology Architect Outsourced Architecture Multiple Architects

Creating a Symphony Governance Architectural Models Project and Program Management

Beyond Basics Language Standard Operational Environment Virtualization Mobile Technologies Service-Oriented Architecture (SOA) Whatever’s Next

Resources

Enterprise Architecture Challenges

Complexity Sources of Complexity Opposition to Standardization

Enterprise Information Management Sell the Value of Information Avoid Drawing Fire Look Beyond the Project Align Technology and Business

Data Center Management Consolidation Automation Virtualization Plan for the Worst and Hope to Be Wrong

Finding Value
Impact and Return on Effort Applying the 80/20 Rule Expectations from Architectural Change An Objective View
The Federated Enterprise

Legal Mandates Alphabet Soup Discovery and Retention Extended Legal Involvement Managing Risk

Beyond the End Planned Obsolescence Hidden Obsolescence

Good Enough Architecture

Managing Identity
The Many-Walled Garden

Identification What You Know What You Have What You Are Multifactor Identification

Authentication The Authentication Directory External Authentication Authentication Standards Single Sign-On

Authorization Access Controls

Identity Management Regulatory Mandates Business Drivers Identity Management Elements Identity Management Providers

Identity Management Strategies Implement Strong Identification Combine Authentication and Authorization Assign Rights to Groups Employ Identity Management Solutions Simplify the Garden

Sharing Information

The Value of Communication Communication Systems Network of Trust Collective Intelligence

Communication Technologies Asynchronous Communications Synchronous Communications Telepresence

Combined Collaboration Groupware Portals

Beyond the Boundary

Storing Information

Everything in Its Place File Storage Logging E-mail Repositories Virtual Computers

Storage Policies Scouting the Land Areas of Interest

Data Protection Backups Media Retirement

Making Connections
What Came Before

The World Wide Web Web 1.0 Web 2.0 Web 3.0 Culture
The Needle in the Haystack Ranking Caching Bogus Information Name Squatting Typos and One-Offs Name Service Poisoning

Inter, Intra, and Extra Internet Intranet Extranet

Anytime/Anywhere Computing

Mobile Technologies New Technologies Network Connectivity Extending the Enterprise

Accessibility

Mobile and Remote Access Mobile Limitations Remote Desktops Transport Security Kill Pills Device Interaction Signal Boosters

Policy Requirements

Virtualization
Virtualized Services
Virtualized Applications
Virtualized Desktops Remote Desktop Clients Virtual Appliances

Virtualized Servers

Virtualized Networks

Cloud Computing Comparing Cloud and Traditional Application Life Cycles Types of Clouds Cloud Flexibility

Best Practices

Enterprise Sustenance

Project Management

Hardware Firmware Drivers Components Tech Refresh

Software Testing Deployment Update Directory Entries Passwords
Enterprise Security

The Process of Security Security Is like an Onion Program Rather than Project Explain Why Standardize and Simplify

Common Enterprise Threats Load Only in the Nursery Secure the Network Secure the Data Secure the Applications Defend the Enterprise Malware Defense Network Protection
Defense Against the Unexpected Emergency Response Planning Don’t Forget the Little Things

Recovering from Disaster

Continuity of Operations Versus Disaster Recovery Continuity of Operations (COO) Disaster Recovery (DR)

Planning for Recovery Business Impact Analysis (BIA) Risk Assessment (RA) Construct a Plan

Technology in Recovery Planning Alternate Data Center Alternate Equipment Alternate Communications

Future Computing
Bigger Is Better

Supercomputing

Distributed Computing

Grid and Cluster Computing Volunteer Computing Grid Computing Cluster Computing

Distributed Computing and the Cloud

The Sustainable Enterprise Equipment Replacement and Disposal Energy Options Reducing Consumption The Right Location

Index

Each chapter concludes with a Summary


Kirk Hausman is employed as an Assistant Commandant at Texas A&M University and specializes in project management, enterprise architecture, IT governance, security and business continuity, information assurance, and regulatory compliance. He has a background that includes digital forensics, WMD/wide-area disaster response planning, pandemic response planning, and technology audit practices in higher education, corporate, and health care venues. His experience includes application design, data resource management, network architecture, server and storage virtualization, strategic technology modernization, network and backup centralization, research computing, and large-network business continuity/disaster recovery planning.

With a Master’s degree in Information Technology, Mr. Hausman has served as a senior research scientist in the fields of cyber terrorism, cybercrime, and cyber security. He lectures regularly on the uses of technology in education, solutions for persons with disabling conditions, and strategic architectural planning to improve enterprise efficiencies. Mr. Hausman has served as a subject-matter expert before both Houses of the Texas State Legislature and has more than 20 books currently in print, together with numerous articles and white papers addressing enterprise architecture, cyber terrorism, and IT governance. His professional certifications include the CISSP, CGEIT, CRISC, CISA, CISM, and CCP, together with a wide assortment of technology- and regulatory-specific designations.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.