E-Book, Englisch, 304 Seiten
Hausman Sustainable Enterprise Architecture
1. Auflage 2011
ISBN: 978-1-4398-2155-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 304 Seiten
ISBN: 978-1-4398-2155-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.
Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.
The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.
Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.
Zielgruppe
IT managers, network planners, and operations managers.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
The Impact of Enterprise Architecture
Simple Choice, Complex Impact A Strong Hand Opportunity Costs Ripples in the Pond
Where the Only Constant Is Change Lilliput and Blefuscu Open Source and Open Standards
The Best Solution
Enterprise Planning
Beyond Platform Selection
Where Lies Success?
The Architect The Chief Architect The Lead Architect The Business Architect The Technology Architect Outsourced Architecture Multiple Architects
Creating a Symphony Governance Architectural Models Project and Program Management
Beyond Basics Language Standard Operational Environment Virtualization Mobile Technologies Service-Oriented Architecture (SOA) Whatever’s Next
Resources
Enterprise Architecture Challenges
Complexity Sources of Complexity Opposition to Standardization
Enterprise Information Management Sell the Value of Information Avoid Drawing Fire Look Beyond the Project Align Technology and Business
Data Center Management Consolidation Automation Virtualization Plan for the Worst and Hope to Be Wrong
Finding Value
Impact and Return on Effort Applying the 80/20 Rule Expectations from Architectural Change An Objective View
The Federated Enterprise
Legal Mandates Alphabet Soup Discovery and Retention Extended Legal Involvement Managing Risk
Beyond the End Planned Obsolescence Hidden Obsolescence
Good Enough Architecture
Managing Identity
The Many-Walled Garden
Identification What You Know What You Have What You Are Multifactor Identification
Authentication The Authentication Directory External Authentication Authentication Standards Single Sign-On
Authorization Access Controls
Identity Management Regulatory Mandates Business Drivers Identity Management Elements Identity Management Providers
Identity Management Strategies Implement Strong Identification Combine Authentication and Authorization Assign Rights to Groups Employ Identity Management Solutions Simplify the Garden
Sharing Information
The Value of Communication Communication Systems Network of Trust Collective Intelligence
Communication Technologies Asynchronous Communications Synchronous Communications Telepresence
Combined Collaboration Groupware Portals
Beyond the Boundary
Storing Information
Everything in Its Place File Storage Logging E-mail Repositories Virtual Computers
Storage Policies Scouting the Land Areas of Interest
Data Protection Backups Media Retirement
Making Connections
What Came Before
The World Wide Web Web 1.0 Web 2.0 Web 3.0 Culture
The Needle in the Haystack Ranking Caching Bogus Information Name Squatting Typos and One-Offs Name Service Poisoning
Inter, Intra, and Extra Internet Intranet Extranet
Anytime/Anywhere Computing
Mobile Technologies New Technologies Network Connectivity Extending the Enterprise
Accessibility
Mobile and Remote Access Mobile Limitations Remote Desktops Transport Security Kill Pills Device Interaction Signal Boosters
Policy Requirements
Virtualization
Virtualized Services
Virtualized Applications
Virtualized Desktops Remote Desktop Clients Virtual Appliances
Virtualized Servers
Virtualized Networks
Cloud Computing Comparing Cloud and Traditional Application Life Cycles Types of Clouds Cloud Flexibility
Best Practices
Enterprise Sustenance
Project Management
Hardware Firmware Drivers Components Tech Refresh
Software Testing Deployment Update Directory Entries Passwords
Enterprise Security
The Process of Security Security Is like an Onion Program Rather than Project Explain Why Standardize and Simplify
Common Enterprise Threats Load Only in the Nursery Secure the Network Secure the Data Secure the Applications Defend the Enterprise Malware Defense Network Protection
Defense Against the Unexpected Emergency Response Planning Don’t Forget the Little Things
Recovering from Disaster
Continuity of Operations Versus Disaster Recovery Continuity of Operations (COO) Disaster Recovery (DR)
Planning for Recovery Business Impact Analysis (BIA) Risk Assessment (RA) Construct a Plan
Technology in Recovery Planning Alternate Data Center Alternate Equipment Alternate Communications
Future Computing
Bigger Is Better
Supercomputing
Distributed Computing
Grid and Cluster Computing Volunteer Computing Grid Computing Cluster Computing
Distributed Computing and the Cloud
The Sustainable Enterprise Equipment Replacement and Disposal Energy Options Reducing Consumption The Right Location
Index
Each chapter concludes with a Summary




