The Open Group: An Introduction - PowerPoint PPT Presentation

About This Presentation
Title:

The Open Group: An Introduction

Description:

Best practices guides. Practical guiding principles. Frequently ... Best practices on business information directory. Best practice for information delivery ... – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 28
Provided by: davidlo2
Learn more at: http://www.opengroup.org
Category:

less

Transcript and Presenter's Notes

Title: The Open Group: An Introduction


1
The Open Group An Introduction
  • Interoperable Informatics Infrastructure
    Consortium May 6th, 2003

44 Montgomery Street Suite 960 San Francisco,
CA 94104 USA Tel 1 415 374 8280 ext. 200 Fax 1
415 374 8293 www.opengroup.org
Your Name Title Mobile 1 415 999 9999 GSM 44
7771 999999 a.person_at_opengroup.org
2
The I3C Mission
  • I3C develops and promotes global, vendor-neutral
    informatics solutions that improve data quality
    and accelerate the development of life science
    products.

3
To Achieve the Mission..
  • Conflicting forces must be balanced to succeed
  • Free information exchange and IPR
  • Regulatory compliance and operational efficiency
  • Standardization and complexity
  • The signs on how to proceed are not always clear

The I3C is not alone in these challenges!
4
The Open Group Mission
  • To drive the creation of Boundaryless Information
    Flow by
  • Working with customers to capture, understand and
    address current and emerging requirements,
    establish policies and share best practices
  • Working with suppliers, consortia and standards
    bodies to develop consensus and facilitate
    interoperability, to evolve and integrate open
    specifications and open source technologies
  • Offering a comprehensive set of services to
    enhance the operational efficiency of consortia
    and
  • Developing and operating the industry's premier
    certification service and encouraging procurement
    of certified products.

5
Boundaryless Information Flow
  • To achieve Boundaryless Information Flow an
    organization needs to put in place infrastructure
    services that bring information together and
    provide that information to those users and
    applications that need it.
  • Boundaryless Information Flow represents a set
    of challenges that most companies have.
  • The Open Group is tackling the problems
    represented by Boundaryless Information Flow and
    is the place in the industry to work on these
    issues.

6
I3C and The Open Group
  • By working together, the I3C can leverage The
    Open Groups work to achieve a vision of a
    Interoperable, Secure and dependable Informatics
    Infrastructure
  • Opportunities exist for immediate benefit
  • Architecture
  • Security
  • Directory

7
The Open Group is ..
  • A global consortium committed to delivering
    greater business efficiency by bringing together
    buyers and suppliers of information technology to
    lower the time, cost and risk associated with
    integrating new technology across the enterprise.

Information
Infrastructure
  • Methods
  • Best practices guides
  • Practical guiding principles
  • Frequently found issues and solutions
  • Enterprise architecture method
  • Best practices on business information directory
  • Best practice for information delivery

Business
  • Select and integrate standards
  • Profiles of the standards
  • Proof of concepts
  • Certified products
  • Overall gap and overlap reports
  • Reports on alternative approaches
  • Proof of concept reports

Technical
8
Our Role
  • Ensure requirements derived from real
    interoperability issues are driving standards
    (Customer view)
  • Ensure technical direction of interoperability
    standards are addressing market needs (Supplier
    view)
  • Enable peers to share best practice and learn
    from the experiences of others
  • Enable networking with knowledgeable people who
    are making an impact on the technical direction
    of IT industry
  • Provide a forum for IT standards with a focus on
    interoperability
  • Build relationships with other consortia
  • Deliver assurance of interoperability through
    certification and testing

9
Delivering on the Roles
Customers Requirements Business Scenarios
Challenges Policies and best practice Case
studies and shared experience Guides Collaborativ
e authoring Tools and methodologies Adopt and
adapt Procurement Single organization or combined
Suppliers Solutions Through their
products Response to requirements Technical
direction Standards Adopt, adapt and integrate
specifications Technology Sponsor Open Source
developments Conformance to standards Established
through certification and testing
10
Our Sponsors
  • Sponsors provide over 300 billion worth of IT
    products world-wide annually
  • Ship significant volume products branded by The
    Open Group

11
Diverse Membership
  • Members represent a wide range of company sizes,
    industries and public/private organizations
  • Members have combined IT budgets of over 50
    billion annually
  • For example

12
Relations with Consortia and Other Organizations
  • Austin Group
  • Association of Interactive Media
  • Bluetooth SIG
  • Carnegie Mellon University
  • Center for Internet Security (CIS)
  • Data Interchange Standards Association
  • Database Interoperability Group
  • DCI
  • DMTF
  • DSML
  • EEMA
  • Free Standards Group
  • Global Grid Forum
  • GMD Fokus Group
  • ICX Security
  • IEEE PASC
  • IEEE Standards Association
  • IETF
  • Internet Mail Consortium
  • J Consortium
  • Linux Standards Base
  • MPLS Forum
  • MWIF
  • NCITS R1
  • NAC
  • NIST PCSRF
  • OASIS
  • OMG 
  • OSGi
  • POSC
  • PCCA
  • QoS Forum
  • SAE
  • SNIA
  • SyncML
  • Telecommunications Industry Association
  • TMF
  • UDI Consortium

13
Services Continuum
Certification Testing
  • Management Services
  • Consortia Formation
  • Operations
  • Infrastructure Provision
  • Strategy Services
  • Business Scenarios
  • Architecture development
  • Collaboration
  • Research
  • Interoperability events
  • Homesteading
  • Research Innovation
  • Certification Testing
  • Program development
  • Test development
  • Certification Operations
  • Standards
  • Technical editing
  • Consensus review process
  • Publication

Standards
Collaboration Research
goals
StrategyServices
Management Services
time
14
Specific Interaction Opportunities
  • Architecture
  • Security
  • Directory

15
Architecture
  • An effective framework

Knowledgeable and professional practitioners
Adequate Commercial Off-The-Shelf tools
16
The Enterprise Continuum
Architecture Continuum
Foundation Architectures
Common Systems Architectures
Industry Architectures
Organisation Architectures
Guides Supports
Guides Supports
Guides Supports
Guides Supports
SystemsSolutions
Industry Solutions
Organisation Solutions
Products Services
Solutions Continuum
17
Enterprise ADM - Key Points
An iterative method Each iteration requires
decisions on Focus - enterprise coverage Time
horizon aimed at Architecture assets to be
leveraged assets from previous iterations assets
available elsewhere (other frameworks, system
models, vertical industry models, etc.) Decisions
made on practical assessment of resource /
competence availability value expected to accrue
to the enterprise
18
Boundaryless Information Flow - Business Taxonomy
Security Policy
  • Mobility Policy

Phone Books/Directories
Information Consumers
Management Organization
Brokers
Development Organization
Information Provider
Performance Service Level
Manageability Policy
19
Boundaryless Information Flow - Technical Taxonomy
Qualities Qualities
Security Policy
  • Mobility Policy

Application Platform
Information Consumer Applications
Management Utilities
Brokering Applications
Development Tools
Information Provider Applications
Performance SLAs
Manageability Policy
  • Classes of Interfaces - formats and protocols

20
A Level 2 Model
Qualities Qualities
Security
Mobility
Application Platform
Information Consumer Applications
Desktop Video Conference
Web Portal
information Access
Streaming audio / video
Mail
Phone / Fax
Directory Referencing/Dereferencing Naming Registr
ation Publish Subscribe Discovery
Application Message Format
Presentation Transformation Browser
services Portal and personalization Meta indices
Application Messaging
Application to application communications services
Languages Libraries Registries
Enterprise Appl Integration
Management Utilities
Brokering Applications
Development Tools
Monitors Executory Utilities Copy Managers
Business modeling tools Design
tools Construction tools Languages and Libraries
Information Brokers Application Integrators
Digital Signature Intrusion Detection Key
Management Firewall Encryption AAAC SSO
Information Access Transformation Mapping Query
distribution Aggregation Search File
services Web services
Info Format eForm services Instant messaging
services
Information Provider Applications
Desktop Video Conference
Web Portal
information Access
Streaming audio / video
Mail
Phone / Fax
Messaging/Event Brokering
Process/Workflow Control
Performance
Manageability
21
Security
22
Security our Vision
  • Security is about achieving business objectives
    within applicable law and policy
  • Managing risk
  • Not merely preventing bad things
  • Security creates protected systems with
    controlled perimeters
  • A controlled perimeter is boundaryless where
    (and only where) it needs to be
  • Security design is necessarily pervasive

23
Security our Mission
  • Bridge the gap between business objectives and
    traditional security technology
  • Identifygaps in both understanding and technology
  • Better understanding between buyers and suppliers
  • Positioning within the Security Life Cycle
    Concept, Requirements, H-L Design, L-L Design,
    Implementation, Integration, Test
    Certification, Operation Maintenance,
    Obsolescence Succession.
  • Develop collaborative activities with other
    consortia to avoid duplication of effort
    leverage best-of-breed solutions
  • A big part of the problem is just defining
    exactly what problem were solving

24
Directory Interoperability
25
Working Together
  • Wed like to invite the I3C to work with The Open
    Group to identify and establish standards and
    best practices in
  • Boundaryless Informatics Architecture
  • Security Policies and Risk Management practices
  • Directory Interoperability

26
In conclusion
  • By engaging with other IT vendors and customers
    working toward a vision of Boundaryless
    Information Flow , the I3C can realize
  • Faster and simpler identification of necessary
    interoperability, reliability standards for
    informatics
  • Faster availability of necessary informatics
    standards in commercial practice

Faster and more efficient deployment of life
science products
27
Thank You
  • Any Questions?

44 Montgomery Street Suite 960 San Francisco,
CA 94104 USA Tel 1 415 374 8280 ext. 200 Fax 1
415 374 8293 www.opengroup.org
Your Name Title Mobile 1 415 999 9999 GSM 44
7771 999999 a.person_at_opengroup.org
Write a Comment
User Comments (0)
About PowerShow.com