E-Book, Englisch, 304 Seiten
ISBN: 978-1-4665-0899-6
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.
The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.
Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
The Impact of Enterprise Architecture
Simple Choice, Complex Impact
A Strong Hand
Opportunity Costs
Ripples in the Pond
Where the Only Constant Is Change
Lilliput and Blefuscu
Open Source and Open Standards
The Best Solution
Enterprise Planning
Beyond Platform Selection
Where Lies Success?
The Architect
The Chief Architect
The Lead Architect
The Business Architect
The Technology Architect
Outsourced Architecture
Multiple Architects
Creating a Symphony
Governance
Architectural Models
Project and Program Management
Beyond Basics
Language Standard
Operational Environment
Virtualization
Mobile Technologies
Service-Oriented Architecture (SOA)
Whatever’s Next
Resources
Enterprise Architecture Challenges
Complexity
Sources of Complexity
Opposition to Standardization
Enterprise Information Management
Sell the Value of Information
Avoid Drawing Fire
Look Beyond the Project
Align Technology and Business
Data Center Management
Consolidation
Automation
Virtualization
Plan for the Worst and Hope to Be Wrong
Finding Value
Impact and Return on Effort
Applying the 80/20 Rule
Expectations from Architectural Change
An Objective View
The Federated Enterprise
Legal Mandates
Alphabet Soup
Discovery and Retention
Extended Legal Involvement
Managing Risk
Beyond the End
Planned Obsolescence
Hidden Obsolescence
Good Enough Architecture
Managing Identity
The Many-Walled Garden
Identification
What You Know
What You Have
What You Are
Multifactor Identification
Authentication
The Authentication Directory
External Authentication
Authentication Standards
Single Sign-On
Authorization
Access Controls
Identity Management
Regulatory Mandates
Business Drivers
Identity Management Elements
Identity Management Providers
Identity Management Strategies
Implement Strong Identification
Combine Authentication and Authorization
Assign Rights to Groups
Employ Identity Management Solutions
Simplify the Garden
Sharing Information
The Value of Communication
Communication Systems
Network of Trust
Collective Intelligence
Communication Technologies
Asynchronous Communications
Synchronous Communications
Telepresence
Combined Collaboration
Groupware
Portals
Beyond the Boundary
Storing Information
Everything in Its Place
File Storage
Logging
E-mail
Repositories
Virtual Computers
Storage Policies
Scouting the Land
Areas of Interest
Data Protection
Backups
Media Retirement
Making Connections
What Came Before
The World Wide Web
Web 1.0
Web 2.0
Web 3.0
Culture
The Needle in the Haystack
Ranking
Caching
Bogus Information
Name Squatting
Typos and One-Offs
Name Service Poisoning
Inter, Intra, and Extra
Internet
Intranet
Extranet
Anytime/Anywhere Computing
Mobile Technologies
New Technologies
Network Connectivity
Extending the Enterprise
Accessibility
Mobile and Remote Access
Mobile Limitations
Remote Desktops
Transport Security
Kill Pills
Device Interaction
Signal Boosters
Policy Requirements
Virtualization
Virtualized Services
Virtualized Applications
Virtualized Desktops
Remote Desktop Clients
Virtual Appliances
Virtualized Servers
Virtualized Networks
Cloud Computing
Comparing Cloud and Traditional Application Life Cycles
Types of Clouds
Cloud Flexibility
Best Practices
Enterprise Sustenance
Project Management
Hardware
Firmware
Drivers
Components
Tech Refresh
Software
Testing
Deployment
Update
Directory Entries
Passwords
Enterprise Security
The Process of Security
Security Is like an Onion
Program Rather than Project
Explain Why
Standardize and Simplify
Common Enterprise Threats
Load Only in the Nursery
Secure the Network
Secure the Data
Secure the Applications
Defend the Enterprise
Malware Defense
Network Protection
Defense Against the Unexpected
Emergency Response Planning
Don’t Forget the Little Things
Recovering from Disaster
Continuity of Operations Versus Disaster Recovery
Continuity of Operations (COO)
Disaster Recovery (DR)
Planning for Recovery
Business Impact Analysis (BIA)
Risk Assessment (RA)
Construct a Plan
Technology in Recovery Planning
Alternate Data Center
Alternate Equipment
Alternate Communications
Future Computing
Bigger Is Better
Supercomputing
Distributed Computing
Grid and Cluster Computing
Volunteer Computing
Grid Computing
Cluster Computing
Distributed Computing and the Cloud
The Sustainable Enterprise
Equipment Replacement and Disposal
Energy Options
Reducing Consumption
The Right Location
Index
Each chapter concludes with a Summary