Cover image for Sustainable enterprise architecture
Title:
Sustainable enterprise architecture
Publication Information:
Boca Raton, FL : CRC, 2011
Physical Description:
xvii, 275 pages : illustrations ; 24 cm.
ISBN:
9781439821541
General Note:
Includes index
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010344200 HD30.213 S87 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.

Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.

The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.

Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.


Author Notes

Kirk Hausman is employed as an Assistant Commandant at Texas A&M University and specializes in project management, enterprise architecture, IT governance, security and business continuity, information assurance, and regulatory compliance. He has a background that includes digital forensics, WMD/wide-area disaster response planning, pandemic response planning, and technology audit practices in higher education, corporate, and health care venues. His experience includes application design, data resource management, network architecture, server and storage virtualization, strategic technology modernization, network and backup centralization, research computing, and large-network business continuity/disaster recovery planning.

With a Master's degree in Information Technology, Mr. Hausman has served as a senior research scientist in the fields of cyber terrorism, cybercrime, and cyber security. Henbsp;lectures regularly on the uses of technology in education, solutions for persons with disabling conditions, and strategic architectural planning to improve enterprise efficiencies. Mr. Hausmannbsp;has served as a subject-matter expert before both Houses of the Texas State Legislature and has more than 20 books currently in print, together with numerous articles and white papers addressing enterprise architecture, cyber terrorism, and IT governance.nbsp;His professional certifications include the CISSP, CGEIT, CRISC, CISA, CISM, and CCP, together with a wide assortment of technology- and regulatory-specific designations.


Table of Contents

Prefacep. xv
Acknowledgmentsp. xix
About the Authorp. xxi
Chapter 1 The Impact of Enterprise Architecturep. 1
In This Chapterp. 1
Simple Choice, Complex Impactp. 2
A Strong Handp. 2
Opportunity Costsp. 3
Ripples in the Pondp. 5
Where the Only Constant Is Changep. 7
Lilliput and Blefuscup. 7
Open Source and Open Standardsp. 10
The Best Solutionp. 14
Chapter 2 Enterprise Planningp. 15
In This Chapterp. 15
Beyond Platform Selectionp. 16
Where Lies Success?p. 21
The Architectp. 25
The Chief Architectp. 27
The Lead Architectp. 29
The Business Architectp. 30
The Technology Architectp. 30
Outsourced Architecturep. 30
Multiple Architectsp. 31
Creating a Symphonyp. 33
Governancep. 33
Architectural Modelsp. 36
Project and Program Managementp. 38
Beyond Basicsp. 40
Language Standardp. 40
Operational Environmentp. 40
Virtualizationp. 41
Mobile Technologiesp. 41
Service-Oriented Architecture (SOA)p. 41
Whatever's Nextp. 42
Summaryp. 42
Resourcesp. 43
Chapter 3 Enterprise Architecture Challengesp. 45
In This Chapterp. 45
Complexityp. 46
Sources of Complexityp. 47
Opposition to Standardizationp. 47
Enterprise Information Managementp. 51
Sell the Value of Informationp. 51
Avoid Drawing Firep. 52
Look Beyond the Projectp. 60
Align Technology and Businessp. 61
Data Center Managementp. 65
Consolidationp. 65
Automationp. 72
Virtualizationp. 74
Plan for the Worst and Hope to Be Wrongp. 76
Summaryp. 77
Chapter 4 Finding Valuep. 79
In This Chapterp. 79
Impact and Return on Effortp. 80
Applying the 80/20 Rulep. 80
Expectations from Architectural Changep. 81
An Objective Viewp. 82
The Federated Enterprisep. 83
Legal Mandatesp. 84
Alphabet Soupp. 84
Discovery and Retentionp. 85
Extended Legal Involvementp. 85
Managing Riskp. 86
Beyond the Endp. 88
Planned Obsolescencep. 88
Hidden Obsolescencep. 89
Good Enough Architecturep. 89
Summaryp. 89
Chapter 5 Managing Identityp. 91
In This Chapterp. 91
The Many-Walled Gardenp. 92
Identificationp. 93
What You Knowp. 94
What You Havep. 96
What You Arep. 97
Multifactor Identificationp. 101
Authenticationp. 102
The Authentication Directoryp. 102
External Authenticationp. 103
Authentication Standardsp. 103
Single Sign-Onp. 105
Authorizationp. 107
Access Controlsp. 107
Identity Managementp. 109
Regulatory Mandatesp. 109
Business Driversp. 110
Identity Management Elementsp. 110
Identity Management Providersp. 112
Identity Management Strategiesp. 113
Implement Strong Identificationp. 113
Combine Authentication and Authorizationp. 113
Assign Rights to Groupsp. 114
Employ Identity Management Solutionsp. 114
Simplify the Gardenp. 115
Summaryp. 115
Chapter 6 Sharing Informationp. 117
In This Chapterp. 117
The Value of Communicationp. 118
Communication Systemsp. 118
Network of Trustp. 120
Collective Intelligencep. 120
Communication Technologiesp. 121
Asynchronous Communicationsp. 124
Synchronous Communicationsp. 138
Telepresencep. 142
Combined Collaborationp. 145
Groupwarep. 145
Portalsp. 146
Beyond the Boundaryp. 150
Summaryp. 150
Chapter 7 toring Informationp. 151
In This Chapterp. 151
Everything in Its Placep. 152
File Storagep. 153
Loggingp. 153
E-mailp. 154
Repositoriesp. 154
Virtual Computersp. 155
Storage Policiesp. 155
Scouting the Landp. 156
Areas of Interestp. 156
Data Protectionp. 166
Backupsp. 166
Media Retirementp. 167
Summaryp. 168
Chapter 8 Making Connectionsp. 171
In This Chapterp. 171
What Came Beforep. 172
The World Wide Webp. 175
Web 1.0p. 175
Web 2.0p. 176
Web 3.0p. 177
Culturep. 179
The Needle in the Haystackp. 182
Rankingp. 182
Cachingp. 183
Bogus Informationp. 183
Name Squattingp. 184
Typos and One-Offsp. 185
Name Service Poisoningp. 186
Inter, Intra, and Extrap. 187
Internetp. 188
Intranetp. 189
Extranetp. 189
Summaryp. 189
Chapter 9 Anytime/Anywhere Computingp. 191
In This Chapterp. 191
Mobile Technologiesp. 192
New Technologiesp. 192
Network Connectivityp. 194
Extending the Enterprisep. 195
Accessibilityp. 195
Mobile and Remote Accessp. 195
Mobile Limitationsp. 197
Remote Desktopsp. 198
Transport Securityp. 198
Kill Pillsp. 199
Device Interactionp. 199
Signal Boostersp. 200
Policy Requirementsp. 201
Summaryp. 201
Chapter 10 Virtualizationp. 203
In This Chapterp. 203
Virtualized Servicesp. 204
Virtualized Applicationsp. 204
Virtualized Desktopsp. 205
Remote Desktop Clientsp. 205
Virtual Appliancesp. 206
Virtualized Serversp. 207
Virtualized Networksp. 208
Cloud Computingp. 209
Comparing Cloud and Traditional Application Life Cyclesp. 209
Types of Cloudsp. 210
Cloud Flexibilityp. 212
Best Practicesp. 212
Summaryp. 216
Chapter 11 Enterprise Sustenancep. 217
In This Chapterp. 217
Project Managementp. 218
Hardwarep. 219
Firmwarep. 220
Driversp. 221
Componentsp. 222
Tech Refreshp. 222
Softwarep. 226
Testingp. 227
Deploymentp. 227
Updatep. 229
Directory Entriesp. 233
Passwordsp. 233
Summaryp. 234
Chapter 12 Enterprise Securityp. 235
In This Chapterp. 235
The Process of Securityp. 236
Security Is like an Onionp. 236
Program Rather than Projectp. 236
Explain Whyp. 237
Standardize and Simplifyp. 238
Common Enterprise Threatsp. 238
Load Only in the Nurseryp. 238
Secure the Networkp. 239
Secure the Datap. 239
Secure the Applicationsp. 240
Defend the Enterprisep. 241
Malware Defensep. 243
Network Protectionp. 243
Defense Against the Unexpectedp. 243
Emergency Response Planningp. 245
Don't Forget the Little Thingsp. 245
Summaryp. 245
Chapter 13 Recovering from Disasterp. 247
In This Chapterp. 247
Continuity of Operations Versus Disaster Recoveryp. 248
Continuity of Operations (COO)p. 248
Disaster Recovery (DR)p. 249
Planning for Recoveryp. 249
Business Impact Analysis (BIA)p. 250
Risk Assessment (RA)p. 251
Construct a Planp. 251
Technology in Recovery Planningp. 252
Alternate Data Centerp. 252
Alternate Equipmentp. 253
Alternate Communicationsp. 253
Summaryp. 255
Chapter 14 Future Computingp. 257
In This Chapterp. 257
Bigger Is Betterp. 258
Supercomputingp. 260
Distributed Computingp. 261
Grid and Cluster Computingp. 261
Volunteer Computingp. 262
Grid Computingp. 262
Cluster Computingp. 263
Distributed Computing and the Cloudp. 264
The Sustainable Enterprisep. 264
Equipment Replacement and Disposalp. 264
Energy Optionsp. 265
Reducing Consumptionp. 265
The Right Locationp. 266
Summaryp. 266
Indexp. 267