Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010344200 | HD30.213 S87 2011 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.
Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.
The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.
Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.
Author Notes
Kirk Hausman is employed as an Assistant Commandant at Texas A&M University and specializes in project management, enterprise architecture, IT governance, security and business continuity, information assurance, and regulatory compliance. He has a background that includes digital forensics, WMD/wide-area disaster response planning, pandemic response planning, and technology audit practices in higher education, corporate, and health care venues. His experience includes application design, data resource management, network architecture, server and storage virtualization, strategic technology modernization, network and backup centralization, research computing, and large-network business continuity/disaster recovery planning.
With a Master's degree in Information Technology, Mr. Hausman has served as a senior research scientist in the fields of cyber terrorism, cybercrime, and cyber security. Henbsp;lectures regularly on the uses of technology in education, solutions for persons with disabling conditions, and strategic architectural planning to improve enterprise efficiencies. Mr. Hausmannbsp;has served as a subject-matter expert before both Houses of the Texas State Legislature and has more than 20 books currently in print, together with numerous articles and white papers addressing enterprise architecture, cyber terrorism, and IT governance.nbsp;His professional certifications include the CISSP, CGEIT, CRISC, CISA, CISM, and CCP, together with a wide assortment of technology- and regulatory-specific designations.
Table of Contents
Preface | p. xv |
Acknowledgments | p. xix |
About the Author | p. xxi |
Chapter 1 The Impact of Enterprise Architecture | p. 1 |
In This Chapter | p. 1 |
Simple Choice, Complex Impact | p. 2 |
A Strong Hand | p. 2 |
Opportunity Costs | p. 3 |
Ripples in the Pond | p. 5 |
Where the Only Constant Is Change | p. 7 |
Lilliput and Blefuscu | p. 7 |
Open Source and Open Standards | p. 10 |
The Best Solution | p. 14 |
Chapter 2 Enterprise Planning | p. 15 |
In This Chapter | p. 15 |
Beyond Platform Selection | p. 16 |
Where Lies Success? | p. 21 |
The Architect | p. 25 |
The Chief Architect | p. 27 |
The Lead Architect | p. 29 |
The Business Architect | p. 30 |
The Technology Architect | p. 30 |
Outsourced Architecture | p. 30 |
Multiple Architects | p. 31 |
Creating a Symphony | p. 33 |
Governance | p. 33 |
Architectural Models | p. 36 |
Project and Program Management | p. 38 |
Beyond Basics | p. 40 |
Language Standard | p. 40 |
Operational Environment | p. 40 |
Virtualization | p. 41 |
Mobile Technologies | p. 41 |
Service-Oriented Architecture (SOA) | p. 41 |
Whatever's Next | p. 42 |
Summary | p. 42 |
Resources | p. 43 |
Chapter 3 Enterprise Architecture Challenges | p. 45 |
In This Chapter | p. 45 |
Complexity | p. 46 |
Sources of Complexity | p. 47 |
Opposition to Standardization | p. 47 |
Enterprise Information Management | p. 51 |
Sell the Value of Information | p. 51 |
Avoid Drawing Fire | p. 52 |
Look Beyond the Project | p. 60 |
Align Technology and Business | p. 61 |
Data Center Management | p. 65 |
Consolidation | p. 65 |
Automation | p. 72 |
Virtualization | p. 74 |
Plan for the Worst and Hope to Be Wrong | p. 76 |
Summary | p. 77 |
Chapter 4 Finding Value | p. 79 |
In This Chapter | p. 79 |
Impact and Return on Effort | p. 80 |
Applying the 80/20 Rule | p. 80 |
Expectations from Architectural Change | p. 81 |
An Objective View | p. 82 |
The Federated Enterprise | p. 83 |
Legal Mandates | p. 84 |
Alphabet Soup | p. 84 |
Discovery and Retention | p. 85 |
Extended Legal Involvement | p. 85 |
Managing Risk | p. 86 |
Beyond the End | p. 88 |
Planned Obsolescence | p. 88 |
Hidden Obsolescence | p. 89 |
Good Enough Architecture | p. 89 |
Summary | p. 89 |
Chapter 5 Managing Identity | p. 91 |
In This Chapter | p. 91 |
The Many-Walled Garden | p. 92 |
Identification | p. 93 |
What You Know | p. 94 |
What You Have | p. 96 |
What You Are | p. 97 |
Multifactor Identification | p. 101 |
Authentication | p. 102 |
The Authentication Directory | p. 102 |
External Authentication | p. 103 |
Authentication Standards | p. 103 |
Single Sign-On | p. 105 |
Authorization | p. 107 |
Access Controls | p. 107 |
Identity Management | p. 109 |
Regulatory Mandates | p. 109 |
Business Drivers | p. 110 |
Identity Management Elements | p. 110 |
Identity Management Providers | p. 112 |
Identity Management Strategies | p. 113 |
Implement Strong Identification | p. 113 |
Combine Authentication and Authorization | p. 113 |
Assign Rights to Groups | p. 114 |
Employ Identity Management Solutions | p. 114 |
Simplify the Garden | p. 115 |
Summary | p. 115 |
Chapter 6 Sharing Information | p. 117 |
In This Chapter | p. 117 |
The Value of Communication | p. 118 |
Communication Systems | p. 118 |
Network of Trust | p. 120 |
Collective Intelligence | p. 120 |
Communication Technologies | p. 121 |
Asynchronous Communications | p. 124 |
Synchronous Communications | p. 138 |
Telepresence | p. 142 |
Combined Collaboration | p. 145 |
Groupware | p. 145 |
Portals | p. 146 |
Beyond the Boundary | p. 150 |
Summary | p. 150 |
Chapter 7 toring Information | p. 151 |
In This Chapter | p. 151 |
Everything in Its Place | p. 152 |
File Storage | p. 153 |
Logging | p. 153 |
p. 154 | |
Repositories | p. 154 |
Virtual Computers | p. 155 |
Storage Policies | p. 155 |
Scouting the Land | p. 156 |
Areas of Interest | p. 156 |
Data Protection | p. 166 |
Backups | p. 166 |
Media Retirement | p. 167 |
Summary | p. 168 |
Chapter 8 Making Connections | p. 171 |
In This Chapter | p. 171 |
What Came Before | p. 172 |
The World Wide Web | p. 175 |
Web 1.0 | p. 175 |
Web 2.0 | p. 176 |
Web 3.0 | p. 177 |
Culture | p. 179 |
The Needle in the Haystack | p. 182 |
Ranking | p. 182 |
Caching | p. 183 |
Bogus Information | p. 183 |
Name Squatting | p. 184 |
Typos and One-Offs | p. 185 |
Name Service Poisoning | p. 186 |
Inter, Intra, and Extra | p. 187 |
Internet | p. 188 |
Intranet | p. 189 |
Extranet | p. 189 |
Summary | p. 189 |
Chapter 9 Anytime/Anywhere Computing | p. 191 |
In This Chapter | p. 191 |
Mobile Technologies | p. 192 |
New Technologies | p. 192 |
Network Connectivity | p. 194 |
Extending the Enterprise | p. 195 |
Accessibility | p. 195 |
Mobile and Remote Access | p. 195 |
Mobile Limitations | p. 197 |
Remote Desktops | p. 198 |
Transport Security | p. 198 |
Kill Pills | p. 199 |
Device Interaction | p. 199 |
Signal Boosters | p. 200 |
Policy Requirements | p. 201 |
Summary | p. 201 |
Chapter 10 Virtualization | p. 203 |
In This Chapter | p. 203 |
Virtualized Services | p. 204 |
Virtualized Applications | p. 204 |
Virtualized Desktops | p. 205 |
Remote Desktop Clients | p. 205 |
Virtual Appliances | p. 206 |
Virtualized Servers | p. 207 |
Virtualized Networks | p. 208 |
Cloud Computing | p. 209 |
Comparing Cloud and Traditional Application Life Cycles | p. 209 |
Types of Clouds | p. 210 |
Cloud Flexibility | p. 212 |
Best Practices | p. 212 |
Summary | p. 216 |
Chapter 11 Enterprise Sustenance | p. 217 |
In This Chapter | p. 217 |
Project Management | p. 218 |
Hardware | p. 219 |
Firmware | p. 220 |
Drivers | p. 221 |
Components | p. 222 |
Tech Refresh | p. 222 |
Software | p. 226 |
Testing | p. 227 |
Deployment | p. 227 |
Update | p. 229 |
Directory Entries | p. 233 |
Passwords | p. 233 |
Summary | p. 234 |
Chapter 12 Enterprise Security | p. 235 |
In This Chapter | p. 235 |
The Process of Security | p. 236 |
Security Is like an Onion | p. 236 |
Program Rather than Project | p. 236 |
Explain Why | p. 237 |
Standardize and Simplify | p. 238 |
Common Enterprise Threats | p. 238 |
Load Only in the Nursery | p. 238 |
Secure the Network | p. 239 |
Secure the Data | p. 239 |
Secure the Applications | p. 240 |
Defend the Enterprise | p. 241 |
Malware Defense | p. 243 |
Network Protection | p. 243 |
Defense Against the Unexpected | p. 243 |
Emergency Response Planning | p. 245 |
Don't Forget the Little Things | p. 245 |
Summary | p. 245 |
Chapter 13 Recovering from Disaster | p. 247 |
In This Chapter | p. 247 |
Continuity of Operations Versus Disaster Recovery | p. 248 |
Continuity of Operations (COO) | p. 248 |
Disaster Recovery (DR) | p. 249 |
Planning for Recovery | p. 249 |
Business Impact Analysis (BIA) | p. 250 |
Risk Assessment (RA) | p. 251 |
Construct a Plan | p. 251 |
Technology in Recovery Planning | p. 252 |
Alternate Data Center | p. 252 |
Alternate Equipment | p. 253 |
Alternate Communications | p. 253 |
Summary | p. 255 |
Chapter 14 Future Computing | p. 257 |
In This Chapter | p. 257 |
Bigger Is Better | p. 258 |
Supercomputing | p. 260 |
Distributed Computing | p. 261 |
Grid and Cluster Computing | p. 261 |
Volunteer Computing | p. 262 |
Grid Computing | p. 262 |
Cluster Computing | p. 263 |
Distributed Computing and the Cloud | p. 264 |
The Sustainable Enterprise | p. 264 |
Equipment Replacement and Disposal | p. 264 |
Energy Options | p. 265 |
Reducing Consumption | p. 265 |
The Right Location | p. 266 |
Summary | p. 266 |
Index | p. 267 |