Title: The Open Group: An Introduction
1The Open Group An Introduction
- Interoperable Informatics Infrastructure
Consortium May 6th, 2003
44 Montgomery Street Suite 960 San Francisco,
CA 94104 USA Tel 1 415 374 8280 ext. 200 Fax 1
415 374 8293 www.opengroup.org
Your Name Title Mobile 1 415 999 9999 GSM 44
7771 999999 a.person_at_opengroup.org
2The I3C Mission
- I3C develops and promotes global, vendor-neutral
informatics solutions that improve data quality
and accelerate the development of life science
products.
3To Achieve the Mission..
- Conflicting forces must be balanced to succeed
- Free information exchange and IPR
- Regulatory compliance and operational efficiency
- Standardization and complexity
- The signs on how to proceed are not always clear
The I3C is not alone in these challenges!
4The Open Group Mission
- To drive the creation of Boundaryless Information
Flow by
- Working with customers to capture, understand and
address current and emerging requirements,
establish policies and share best practices - Working with suppliers, consortia and standards
bodies to develop consensus and facilitate
interoperability, to evolve and integrate open
specifications and open source technologies - Offering a comprehensive set of services to
enhance the operational efficiency of consortia
and - Developing and operating the industry's premier
certification service and encouraging procurement
of certified products.
5Boundaryless Information Flow
- To achieve Boundaryless Information Flow an
organization needs to put in place infrastructure
services that bring information together and
provide that information to those users and
applications that need it. - Boundaryless Information Flow represents a set
of challenges that most companies have. - The Open Group is tackling the problems
represented by Boundaryless Information Flow and
is the place in the industry to work on these
issues.
6I3C and The Open Group
- By working together, the I3C can leverage The
Open Groups work to achieve a vision of a
Interoperable, Secure and dependable Informatics
Infrastructure - Opportunities exist for immediate benefit
- Architecture
- Security
- Directory
7The Open Group is ..
- A global consortium committed to delivering
greater business efficiency by bringing together
buyers and suppliers of information technology to
lower the time, cost and risk associated with
integrating new technology across the enterprise.
Information
Infrastructure
- Methods
- Best practices guides
- Practical guiding principles
- Frequently found issues and solutions
- Enterprise architecture method
- Best practices on business information directory
- Best practice for information delivery
Business
- Select and integrate standards
- Profiles of the standards
- Proof of concepts
- Certified products
- Overall gap and overlap reports
- Reports on alternative approaches
- Proof of concept reports
Technical
8Our Role
- Ensure requirements derived from real
interoperability issues are driving standards
(Customer view) - Ensure technical direction of interoperability
standards are addressing market needs (Supplier
view) - Enable peers to share best practice and learn
from the experiences of others - Enable networking with knowledgeable people who
are making an impact on the technical direction
of IT industry - Provide a forum for IT standards with a focus on
interoperability - Build relationships with other consortia
- Deliver assurance of interoperability through
certification and testing
9Delivering on the Roles
Customers Requirements Business Scenarios
Challenges Policies and best practice Case
studies and shared experience Guides Collaborativ
e authoring Tools and methodologies Adopt and
adapt Procurement Single organization or combined
Suppliers Solutions Through their
products Response to requirements Technical
direction Standards Adopt, adapt and integrate
specifications Technology Sponsor Open Source
developments Conformance to standards Established
through certification and testing
10Our Sponsors
- Sponsors provide over 300 billion worth of IT
products world-wide annually - Ship significant volume products branded by The
Open Group
11Diverse Membership
- Members represent a wide range of company sizes,
industries and public/private organizations - Members have combined IT budgets of over 50
billion annually - For example
12Relations with Consortia and Other Organizations
- Austin Group
- Association of Interactive Media
- Bluetooth SIG
- Carnegie Mellon University
- Center for Internet Security (CIS)
- Data Interchange Standards Association
- Database Interoperability Group
- DCI
- DMTF
- DSML
- EEMA
- Free Standards Group
- Global Grid Forum
- GMD Fokus Group
- ICX Security
- IEEE PASC
- IEEE Standards Association
- IETF
- Internet Mail Consortium
- J Consortium
- Linux Standards Base
- MPLS Forum
- MWIF
- NCITS R1
- NAC
- NIST PCSRF
- OASIS
- OMGÂ
- OSGi
- POSC
- PCCA
- QoS Forum
- SAE
- SNIA
- SyncML
- Telecommunications Industry Association
- TMF
- UDI Consortium
13Services Continuum
Certification Testing
- Management Services
- Consortia Formation
- Operations
- Infrastructure Provision
- Strategy Services
- Business Scenarios
- Architecture development
- Collaboration
- Research
- Interoperability events
- Homesteading
- Research Innovation
- Certification Testing
- Program development
- Test development
- Certification Operations
- Standards
- Technical editing
- Consensus review process
- Publication
Standards
Collaboration Research
goals
StrategyServices
Management Services
time
14Specific Interaction Opportunities
- Architecture
- Security
- Directory
15Architecture
Knowledgeable and professional practitioners
Adequate Commercial Off-The-Shelf tools
16The Enterprise Continuum
Architecture Continuum
Foundation Architectures
Common Systems Architectures
Industry Architectures
Organisation Architectures
Guides Supports
Guides Supports
Guides Supports
Guides Supports
SystemsSolutions
Industry Solutions
Organisation Solutions
Products Services
Solutions Continuum
17Enterprise ADM - Key Points
An iterative method Each iteration requires
decisions on Focus - enterprise coverage Time
horizon aimed at Architecture assets to be
leveraged assets from previous iterations assets
available elsewhere (other frameworks, system
models, vertical industry models, etc.) Decisions
made on practical assessment of resource /
competence availability value expected to accrue
to the enterprise
18Boundaryless Information Flow - Business Taxonomy
Security Policy
Phone Books/Directories
Information Consumers
Management Organization
Brokers
Development Organization
Information Provider
Performance Service Level
Manageability Policy
19Boundaryless Information Flow - Technical Taxonomy
Qualities Qualities
Security Policy
Application Platform
Information Consumer Applications
Management Utilities
Brokering Applications
Development Tools
Information Provider Applications
Performance SLAs
Manageability Policy
- Classes of Interfaces - formats and protocols
20A Level 2 Model
Qualities Qualities
Security
Mobility
Application Platform
Information Consumer Applications
Desktop Video Conference
Web Portal
information Access
Streaming audio / video
Mail
Phone / Fax
Directory Referencing/Dereferencing Naming Registr
ation Publish Subscribe Discovery
Application Message Format
Presentation Transformation Browser
services Portal and personalization Meta indices
Application Messaging
Application to application communications services
Languages Libraries Registries
Enterprise Appl Integration
Management Utilities
Brokering Applications
Development Tools
Monitors Executory Utilities Copy Managers
Business modeling tools Design
tools Construction tools Languages and Libraries
Information Brokers Application Integrators
Digital Signature Intrusion Detection Key
Management Firewall Encryption AAAC SSO
Information Access Transformation Mapping Query
distribution Aggregation Search File
services Web services
Info Format eForm services Instant messaging
services
Information Provider Applications
Desktop Video Conference
Web Portal
information Access
Streaming audio / video
Mail
Phone / Fax
Messaging/Event Brokering
Process/Workflow Control
Performance
Manageability
21Security
22Security our Vision
- Security is about achieving business objectives
within applicable law and policy - Managing risk
- Not merely preventing bad things
- Security creates protected systems with
controlled perimeters - A controlled perimeter is boundaryless where
(and only where) it needs to be - Security design is necessarily pervasive
23Security our Mission
- Bridge the gap between business objectives and
traditional security technology - Identifygaps in both understanding and technology
- Better understanding between buyers and suppliers
- Positioning within the Security Life Cycle
Concept, Requirements, H-L Design, L-L Design,
Implementation, Integration, Test
Certification, Operation Maintenance,
Obsolescence Succession. - Develop collaborative activities with other
consortia to avoid duplication of effort
leverage best-of-breed solutions - A big part of the problem is just defining
exactly what problem were solving
24Directory Interoperability
25Working Together
- Wed like to invite the I3C to work with The Open
Group to identify and establish standards and
best practices in - Boundaryless Informatics Architecture
- Security Policies and Risk Management practices
- Directory Interoperability
26In conclusion
- By engaging with other IT vendors and customers
working toward a vision of Boundaryless
Information Flow , the I3C can realize - Faster and simpler identification of necessary
interoperability, reliability standards for
informatics - Faster availability of necessary informatics
standards in commercial practice
Faster and more efficient deployment of life
science products
27Thank You
44 Montgomery Street Suite 960 San Francisco,
CA 94104 USA Tel 1 415 374 8280 ext. 200 Fax 1
415 374 8293 www.opengroup.org
Your Name Title Mobile 1 415 999 9999 GSM 44
7771 999999 a.person_at_opengroup.org