Hausman | Sustainable Enterprise Architecture | E-Book | sack.de
E-Book

E-Book, Englisch, 304 Seiten

Hausman Sustainable Enterprise Architecture

E-Book, Englisch, 304 Seiten

ISBN: 978-1-4665-0899-6
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.

Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.

The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.

Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.
Hausman Sustainable Enterprise Architecture jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


The Impact of Enterprise Architecture
Simple Choice, Complex Impact
A Strong Hand
Opportunity Costs
Ripples in the Pond
Where the Only Constant Is Change
Lilliput and Blefuscu
Open Source and Open Standards
The Best Solution

Enterprise Planning
Beyond Platform Selection
Where Lies Success?
The Architect
The Chief Architect
The Lead Architect
The Business Architect
The Technology Architect
Outsourced Architecture
Multiple Architects
Creating a Symphony
Governance
Architectural Models
Project and Program Management
Beyond Basics
Language Standard
Operational Environment
Virtualization
Mobile Technologies
Service-Oriented Architecture (SOA)
Whatever’s Next
Resources

Enterprise Architecture Challenges
Complexity
Sources of Complexity
Opposition to Standardization
Enterprise Information Management
Sell the Value of Information
Avoid Drawing Fire
Look Beyond the Project
Align Technology and Business
Data Center Management
Consolidation
Automation
Virtualization
Plan for the Worst and Hope to Be Wrong

Finding Value
Impact and Return on Effort
Applying the 80/20 Rule
Expectations from Architectural Change
An Objective View
The Federated Enterprise
Legal Mandates
Alphabet Soup
Discovery and Retention
Extended Legal Involvement
Managing Risk
Beyond the End
Planned Obsolescence
Hidden Obsolescence
Good Enough Architecture

Managing Identity
The Many-Walled Garden
Identification
What You Know
What You Have
What You Are
Multifactor Identification
Authentication
The Authentication Directory
External Authentication
Authentication Standards
Single Sign-On
Authorization
Access Controls
Identity Management
Regulatory Mandates
Business Drivers
Identity Management Elements
Identity Management Providers
Identity Management Strategies
Implement Strong Identification
Combine Authentication and Authorization
Assign Rights to Groups
Employ Identity Management Solutions
Simplify the Garden

Sharing Information
The Value of Communication
Communication Systems
Network of Trust
Collective Intelligence
Communication Technologies
Asynchronous Communications
Synchronous Communications
Telepresence
Combined Collaboration
Groupware
Portals
Beyond the Boundary

Storing Information
Everything in Its Place
File Storage
Logging
E-mail
Repositories
Virtual Computers
Storage Policies
Scouting the Land
Areas of Interest
Data Protection
Backups
Media Retirement

Making Connections
What Came Before
The World Wide Web
Web 1.0
Web 2.0
Web 3.0
Culture
The Needle in the Haystack
Ranking
Caching
Bogus Information
Name Squatting
Typos and One-Offs
Name Service Poisoning
Inter, Intra, and Extra
Internet
Intranet
Extranet

Anytime/Anywhere Computing
Mobile Technologies
New Technologies
Network Connectivity
Extending the Enterprise
Accessibility
Mobile and Remote Access
Mobile Limitations
Remote Desktops
Transport Security
Kill Pills
Device Interaction
Signal Boosters
Policy Requirements

Virtualization
Virtualized Services
Virtualized Applications
Virtualized Desktops
Remote Desktop Clients
Virtual Appliances
Virtualized Servers
Virtualized Networks
Cloud Computing
Comparing Cloud and Traditional Application Life Cycles
Types of Clouds
Cloud Flexibility
Best Practices
Enterprise Sustenance
Project Management
Hardware
Firmware
Drivers
Components
Tech Refresh
Software
Testing
Deployment
Update
Directory Entries
Passwords
Enterprise Security
The Process of Security
Security Is like an Onion
Program Rather than Project
Explain Why
Standardize and Simplify
Common Enterprise Threats
Load Only in the Nursery
Secure the Network
Secure the Data
Secure the Applications
Defend the Enterprise
Malware Defense
Network Protection
Defense Against the Unexpected
Emergency Response Planning
Don’t Forget the Little Things

Recovering from Disaster
Continuity of Operations Versus Disaster Recovery
Continuity of Operations (COO)
Disaster Recovery (DR)
Planning for Recovery
Business Impact Analysis (BIA)
Risk Assessment (RA)
Construct a Plan
Technology in Recovery Planning
Alternate Data Center
Alternate Equipment
Alternate Communications

Future Computing
Bigger Is Better
Supercomputing
Distributed Computing
Grid and Cluster Computing
Volunteer Computing
Grid Computing
Cluster Computing
Distributed Computing and the Cloud
The Sustainable Enterprise
Equipment Replacement and Disposal
Energy Options
Reducing Consumption
The Right Location

Index
Each chapter concludes with a Summary


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.