The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008

Size: px
Start display at page:

Download "The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008"

Transcription

1 The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008 Dr. rer. nat. Hellmuth Broda Spokesperson and Individual Contributor, Liberty Alliance; Individual Member, VP Scientific Advisory Board, Swiss Academy of Engineering Sciences (SATW)

2 Vision: From Information to Participation Everyone and Everything Participating on the Network

3 The Massively-Connected Era Rapid Evolution Technology Promotes Connection In just one decade the world has become massively connected Device proliferation, growing bandwidth, service oriented architectures many dimensions/layers of relationship Fractal Architectures We are moving to networks of networks 3

4 We Are Massively Connected... DIGITAL IDENTITY OPEN SOURCE SERVICE ORIENTATION SUBSCRIPTIONS NARRATIVE ENGAGEMENT 4

5 Re-Thinking Total Cost of Ownership ROI Acquisition/Entry Operation Cost of Exit Exit Barriers Test question: Why do you still run your expensive mainframe systems?

6 (IT) Evolution Customize Standardize Utilize

7 Computing Is a Commodity, Computing Systems Aren t Oil Deepwater Platform Electricity Power Plant Computing Network Data Center

8 The Context: All Industries Move from Custom to Utility Models Price Customize Ubiquity Standardize Utilize

9 What Everybody Tells You

10 Three Faces of Open Open Source = Opportunity (for developers) Open Systems = Interoperability (for industry) Open Standards = Choice (for users)

11 Who Benefits? Open Source = Opportunity (for developers)

12 What is Open Source? Using Shared Resources to Solve Needs and Create Wealth Distribute binaries and source code Freely modifiable and re-distributable Non-discriminatory Consensus driven projects Meritocracy Peer review and public discussion OK to make money - but not for access to code

13 Joy's Law Innovation will happen, and it will happen Somewhere Else Bill Joy Aspen Institute

14 Myths About Open Source 1.Open Source developers will build your project for Free 2.Open Source is anti-business 3.Open Source projects are hostile to corporate developers 4.Open Source software never really ships on time (or at acceptable quality) 5.Nobody really makes money

15 Truths About Open Source 1. 45% of CIOs in the Fortune 2000 are looking for an alternative to proprietary OS 2. Linux: massive worldwide deployments 3. Open Source no longer synonymous with free or no/low value technology 4. 55% of Open Source developers at OSDN are paid to work on at least one Open Source project 5. Venture capitalists are investing in open source companies 6. Companies can redistribute open source software and charge for different value-added services

16 Open Source Monetisation Two Golden Rules: Collaborate over what does not differentiate Compete by innovating on the commodity base Monetise Ubiquity at the Point of Value

17 Open Source in a Nutshell A community of developers Learning from each other Sharing a code commons Protecting the commoms Creating wealth from the commons Enriching the commons in the process The guild model re-discovered? Using the commons, the young can stand on the shoulders of the elders Wiki for software

18 And This Is Happening Bundles of software are under Open Source license Earning money with support Open Office in 50+ languages since open

19 But... Open Source relies on Open Systems (and Open Standards) for Interoperability

20 Who Benefits? Open Systems = Interoperability (for industry)

21 What are Open Systems? ``We use state-of-the-art building blocks for both hardware and software. Our open systems philosophy enables easy integration of third party products to enhance and extend the system s capabilities.

22 What Are Open Systems? Published interfaces enable interoperability Third parties can compete with a different implementation permit different implementation of identical functionalities enable some degree of exchangeability can be manufacturer specific use of the interface can require royalty payments to the manufacturer

23 Characteristics of Open Systems Everything necessary to do the job is defined and published No need to escape to use proprietary facilities No undocumented features, no insider tips & tricks Modules can be exchanged (integrateability)

24 Why Not Closed Systems? Locked into one vendor's offering Unpublished program interfaces inhibit third party extensions and adaptations Customers depend on one vendor no best of breed approach possible Customers are forced to follow the upgrade path and licensing model of the vendor

25 But Open Systems Are Not Yet the Full Monty Owned by a single party or small group Interface subject to change without much prior notice Intellectual Property situation sometimes complex Cannot be influenced easily by third parties or the public

26 Who Benefits? Open Standards = Choice (for customers)

27 What are Open Standards? Specifications that Define & describe interfaces, file formats, protocols, etc. Outline agreed-upon conventions Allow and encourage multiple competing implementations without undue constraints Enable diverse programs to work together (interoperability) Developed and managed in an open process Subject to extensive public review

28 Standards in Other Infrastructure Projects Railroads have standards for rail gauges Roads need standards to ensure smooth traffic Ports have standards to ensure smooth flow of ships Airports have standards to ensure aircrafts do not crash Even the sewerage system has a plethora of standards including the size of the manholes

29 Freedom of Choice Choice of solutions from many vendors Open Source Software implementations Conformity with widely accepted industry standards Public specifications, with unrestricted access for everybody, create an even playing field

30 Open Standards are Open if they: Are created and modified through open participation in a widely-recognized vendorneutral industry forum, Are available to anyone for implementation and use on a royalty free basis, and Have no intellectual property encumbrances on their use.

31 So What to Use When? When you want to change the radio in your car do you need the blueprint? (Open Source)

32 So What to Use When? If you have the blueprint will you be able to install your new radio? What you might need is a standard published interface (Open System)

33 So What to Use When? But for custom changes you will need the blueprint (Source Code)

34 Example for Open Standard Liberty Alliance for Identity, Trust, Privacy 150 members in a publicprivate partnership

35 Who Is the Liberty Alliance? Consortium developing open standards Develops open specifications that anyone can implement Liberty does not deliver specific products or services Conformance testing & certification to ensure interoperability For federated identity management In coordination with other standards groups 30+ Liberty-enabled products and services currently available Addresses business & policy issues of identity Guidelines, best practices documents, checklists Support for global privacy regulations built into specs

36 Who is the Liberty Alliance? About 150 diverse member companies and organizations representing leaders in IT, mobility, government, service provision, system integration and finance from across the globe Management Board and Sponsor members include:

37 How We Can Build Trust The biggest concern of the principal/patient/customer is privacy Privacy does not mean that nobody knows nothing about me It is about managing the faith of the principal/patient/customer by adhering to the agreed scope and holding the information in trust Customers are afraid of Purpose Creep What could an architecture for privacy and trust management look like?

38 Security Management Identity Management Architecture for Trust Management Policy Authorization Authentication Identity Definitions A combination of business and technology practices which define how a relationship is conducted and services are performed A set of rules governing decisions about what the user can do: access to information, services or resources Assertion of validity of a set of credentials. Credentials express a person s identity. A Yes/No answer Basic set of information that creates a unique entity (a name with a corresponding set of attributes)

39 Security Management Identity Management Architecture for Trust Management Policy Digitally Speaking Business practices to manage risk, enforce security/privacy, provide auditability. Authorization User, customer preferences, history, personalized services, 3. Determination of access rights to systems, applications and information: Match credentials against profiles, ACLs, policy Authentication Identity 2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting them is indeed the person to which credentials were originally issued. accept or reject 1. User, customer, device facts, e.g., name, address, ID, DNA, keys; credentials, certificates that were issued e. g. by a Certification authority

40 How People Will Trust Policies Policy and its audit have to be guaranteed and certified by a approved public or private independent organization, e. g.: Federal or State data protection agency TÜV (private institution) Audit firm Chamber of Commerce Postal Service or other basic service provider,... This can be achieved with defined processes and responsibilities similar to ISO 9000 Trust is based on policies and the audit of those -- not just on security

41 Liberty's Structure Promotes Privacy and Security Federated structure means no single centralized data storage that would be vulnerable to attack End user has more control of data because permissions travel with data, guiding its use No global identifier--model protects against unauthorized data sharing

42 The Liberty Advantage Wide-spread adoption Convergence with other standards Works with existing legacy systems and future development plans Privacy & security best practices No central point of failure Built on standards e.g., SAML2.0, Shibboleth Federated authentication model 1 billion identities under Liberty protocols Multiple vendor competition Freedom of choice Create trust for all participants Conformance testing & certification Provides for multi-product interoperability

43 Accomplishments The de-facto standard for Identity Federation foundation and Web Services Over 1 billion federation-enabled touch-points Numerous case studies of successful deployments annual IDDY awards Global membership representing: enterprise deployers, vendors, governments, and non-profit organization Published Business and Policy guidelines for best practices in legal, privacy, and business deployments World-recognized Liberty Interoperable test and certification program.

44 Liberty Directions Educate the market Addressing Identity Management needs for a Web 2.0 Environment including: Full range of Identity Management use-case scenarios individual to enterprise Anonymous-to-strongly authenticated credential standards and privacy policies Worldwide privacy and government liaison Web-scalability smallest-to-largest systems Open and heterogeneous solution requirements Rich IdM client functionality for flexible deployments Help drive adoption

45 Need to Bring Together Disparate Identity Efforts New identity-related technologies are entering the market The development of generic web services standards has lagged behind identity web services standards Participation in open dialog between leaders followed silo development Despite recent convergence trends, only Liberty technologies have a certification program

46 Through an Open Approach Drive interoperability throughout the Internet Identity Layer Open the doors to collaboration Open up meetings Open up public forums & lists Grow liaison relationships with new communities Publish a huge inventory of previously confidential material The Concordia Program A public call for interop use cases for heterogeneous environments Expand certification program to meet the requirements

47 John Pugh, Member of Parliament (UK), On Open Standards: Utility of Open Standards is even more important than the utility of Open Source. Parts of industry are moving away from Open Standards and Open Source. That is an extreme step backwards. Without Open Standards there is the danger of lock-in to one single vendor, having to follow him for decades for good or for evil.

48 Special Case of Open Standard: Open Format = Access (For Posterity)

49 The Problem Let us learn from the disasters affecting the Library of Alexandria Where we lost the knowledge of the world from that time Fires and other destructions have been reported from 48 BC (Cesar), 275 AD (Aurelian), 391 AD (Theophilus), 642 AD (Muslim conquest) Source: Wikipedia

50 What is OpenDocument Format (ODF)? Open standard specification for displaying and storing data files Only available open, vendor-neutral, standardized format for office applications Can be implemented by any document processing application vendor Provides access to documents, independent of the applications that created them Approved by OASIS in May 2005 Approved by ISO for international standardization on May 4, 2006

51 Government as Record Keeper Obligation to provide ongoing access Lack of choice = lack of control Lack of control = lack of access Lack of choice = lack of competition Lack of competition = lack of innovation Interoperability is key to connecting silos

52 Why ODF? Long-term reuse of and access to data No lock-in to proprietary tools or undocumented formats Competitive data processing products Reduced costs Increased reliability, because more data automation Platform independence Interoperability

53 Benefits of ODF to Governments Improved stewardship of public records, currently and in the future Consistently applied appropriate privacy and security protections Better IT governance through interoperability Improved quality and accessibility of information and services Eliminate information stove pipes

54 ODF Adoption Momentum OpenDocument Format ODF Alliance: More than 450 companies and organizations: Sun, IBM, Oracle, Red Hat, Novell, Corel, Software AG, Google, etc. OASIS OpenDocument TC: Adobe, IBM, Intel, KDE, Novell, Sun, OpenOffice.org, etc. ODF-supporting applications: OpenOffice.org, StarOffice, IBM Workplace, KOffice, Textmaker, Abiword, Gnumeric, Writely...

55 ODF Adoption Momentum OpenOffice.org/StarOffice More than 500'000 OpenOffice.org downloads per week (1.5 installs per download according to an OpenOffice.org survey) #2 office suite based on unit numbers Free download of StarOffice via Google Packs OpenOffice.org/StarOffice market share estimations by analysts 19% (Yankee Group, 2005)

56 An Open Format is OPEN if it is: Based on an underlying open standard Developed through a publicly visible, community driven process Affirmed and maintained by a vendorindependent standards body Fully documented and publicly available Without proprietary extensions

57 Expect the Unexpected Bright, well-known people contribute code regularly Community finds new uses Jini network technology and Orbitz JXTA and National Retail Federation OpenOffice.org localized to 45 languages, ported to six platforms

58 THANK YOU FOR YOUR ATTENTION Dr. Hellmuth Broda

Managing Trust in e-health with Federated Identity Management

Managing Trust in e-health with Federated Identity Management ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun

More information

Dr. rer. nat. Hellmuth Broda

Dr. rer. nat. Hellmuth Broda International Telecommunication Union Privacy, Security, and Trust with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun Microsystems

More information

Privacy, Security, and Trust with Federated Identity Management

Privacy, Security, and Trust with Federated Identity Management Privacy, Security, and Trust with Federated Identity Management Dr. Hellmuth Broda Distinguished Director and European CTO, Sun Microsystems Spokesperson, Member of the Business Marketing Expert Group,

More information

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Developing a business model for Identity Management Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Life With An Identity Mess A typical intensive IT user has

More information

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine

More information

IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS

IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS Lugano Communication Forum 2006 Dr.rer.nat. Hellmuth Broda Distinguished Director and European Chief Technology Officer

More information

IDDY. Case Study: Rearden Commerce Delivers SaaS Via Federation WINNER

IDDY. Case Study: Rearden Commerce Delivers SaaS Via Federation WINNER 2007 IDDY AWARD WINNER Case Study: Rearden Commerce Delivers SaaS Via Federation Thanks to federation, Rearden Commerce makes it easier than ever for corporate employees to book and manage travel arrangements.

More information

OATH FAQ February 20, 2004

OATH FAQ February 20, 2004 February 20, 2004 1. What is OATH? Due to identify theft, proliferation of IP devices and myriad of other trends in digital identity management the need for ubiquitous strong authentication is clear. Open

More information

Shifting The Ticketing Paradigm

Shifting The Ticketing Paradigm Shifting The Ticketing Paradigm CIPURSE TM Brings Mobility and Security to Transit Ticketing Systems www.osptalliance.org Executive Summary Rising fuel costs, environmental concerns, and rapid population

More information

Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate

Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate WWW.PROJECTLIBERTY.ORG 1 What is Liberty Alliance? Vision: A

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

DCML - The Standard that Enables ITIL Compliance

DCML - The Standard that Enables ITIL Compliance oasis-open.org DCML - The Standard that Enables ITIL Compliance white paper The Data Center Markup Language is the emerging standard that will enable IT organizations worldwide to successfully adopt and

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

What is Open Source? Open source is defined by three key components:

What is Open Source? Open source is defined by three key components: Integrating Open Source into your business To help businesses deal with the complexity of globalization, unanticipated opportunities, unexpected threats, competitive demands and fiscal constraints, a business

More information

Convergence of Open Source Projects and Standards Development SES Webinar Series

Convergence of Open Source Projects and Standards Development SES Webinar Series Convergence of Open Source Projects and Standards Development SES Webinar Series September 24, 2014 Andrew Updegrove Gesmer Updegrove LLP andrew.updegrove@gesmer.com 1 Five years ago companies collaborated

More information

This way, Bluewin will be able to offer single sign-on for service providers within the circle.

This way, Bluewin will be able to offer single sign-on for service providers within the circle. Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will

More information

New Zealand Sets the Pace for SAML 2.0 Deployments

New Zealand Sets the Pace for SAML 2.0 Deployments Case Study: New Zealand Sets the Pace for SAML 2.0 Deployments New Zealand proves that great things often come from small countries as it joins the ranks of e-government SAML 2.0 deployers with its wide-ranging

More information

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards Forum Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards For Um For um: Meeting to tell people that everyone agrees on an issue Walk the

More information

OPEN DOCUMENT FORMATS AS AN ENABLER OF INTEROPERABILITY COMPARISON OF THE OASIS OPENDOCUMENT FORMAT AND MICROSOFT OFFICE OPEN XML

OPEN DOCUMENT FORMATS AS AN ENABLER OF INTEROPERABILITY COMPARISON OF THE OASIS OPENDOCUMENT FORMAT AND MICROSOFT OFFICE OPEN XML OPEN DOCUMENT FORMATS AS AN ENABLER OF INTEROPERABILITY COMPARISON OF THE OASIS OPENDOCUMENT FORMAT AND MICROSOFT OFFICE OPEN XML PC productivity applications (PPAs), including word processing, spreadsheet,

More information

Maximize strategic flexibility by building an open hybrid cloud Gordon Haff

Maximize strategic flexibility by building an open hybrid cloud Gordon Haff red hat open hybrid cloud Whitepaper Maximize strategic flexibility by building an open hybrid cloud Gordon Haff EXECUTIVE SUMMARY Choosing how to build a cloud is perhaps the biggest strategic decision

More information

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem Cloud computing offers massive scalability - in virtual computing power, storage, and applications resources - all at almost

More information

Biometric Single Sign-on using SAML Architecture & Design Strategies

Biometric Single Sign-on using SAML Architecture & Design Strategies Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand

More information

The Freie Universität Berlin - A Short History

The Freie Universität Berlin - A Short History IT Security @ Freie Universita t Berlin By Christoph Wall, Director of Administrative IT, Freie Universität Berlin (Germany) When computers first came into operation to work specific tasks designed to

More information

IDENTITY AND RESILIENCE

IDENTITY AND RESILIENCE IDENTITY AND RESILIENCE Background With the advent of the era of the Internet and globalization, empowered individuals and groups have emerged who use global interconnectedness and anonymity to engage

More information

EduTech Deploys Federated Identity for Maximum Impact

EduTech Deploys Federated Identity for Maximum Impact WINNER EduTech Deploys Federated Identity for Maximum Impact Case Study: EduTech, the organization that provides technology to 697 New York State school districts, was honored for their deployment of a

More information

The Identity Defined Security Alliance

The Identity Defined Security Alliance The Identity Defined Security Alliance A combined solution for achieving Identity Defined Security Whether it s creation of an authentication ceremony, definition and enforcement of policy, enforcement

More information

Identity Federation Management to make Operational and Business Efficiency through SSO

Identity Federation Management to make Operational and Business Efficiency through SSO 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31 (2012) (2012) IACSIT Press, Singapore Identity Federation Management to make Operational and Business

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve

The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.

More information

The Role of Federation in Identity Management

The Role of Federation in Identity Management The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.

More information

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

Leveraging New Business Models with Identity Management An e-learning case study

Leveraging New Business Models with Identity Management An e-learning case study Leveraging New Business Models with Identity Management An e-learning case study José M. del Álamo DIT, Universidad Politécnica de Madrid, Ciudad Universitaria s/n, 28040 Madrid, Spain jmdela@dit.upm.es,

More information

HP Asset Manager. Software version: 5.20. Asset Tracking Solution

HP Asset Manager. Software version: 5.20. Asset Tracking Solution HP Asset Manager Software version: 5.20 Asset Tracking Solution Document Release Date: 01 October 2009 Software Release Date: October 2009 Legal Notices Copyright Notices Copyright 1994-2009 Hewlett-Packard

More information

What is Open Source (Quick Answer)? Collaboration Platform for Web Applications. Virtuous Cycle Model of Open Source (2/2)

What is Open Source (Quick Answer)? Collaboration Platform for Web Applications. Virtuous Cycle Model of Open Source (2/2) Open Source Software - a Collaboration Platform for Web Applications Bebo White bebo@slac.stanford.edu Hong Kong June 6 2007 What is Open Source (Quick Answer)? A community of developers Sharing a code

More information

8/25/2008. Chapter Objectives PART 3. Concepts in Enterprise Resource Planning 2 nd Edition

8/25/2008. Chapter Objectives PART 3. Concepts in Enterprise Resource Planning 2 nd Edition Concepts in Enterprise Resource Planning 2 nd Edition Chapter 2 The Development of Enterprise Resource Planning Systems Chapter Objectives Identify the factors that led to the development of Enterprise

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information

Secure communications via IdentaDefense

Secure communications via IdentaDefense Secure communications via IdentaDefense How vulnerable is sensitive data? Communication is the least secure area of digital information. The many benefits of sending information electronically in a digital

More information

An Enterprise Perspective on Cloud Innovation. Andy Brown UBS Group CTO Client Facing Technologies CIO

An Enterprise Perspective on Cloud Innovation. Andy Brown UBS Group CTO Client Facing Technologies CIO An Enterprise Perspective on Cloud Innovation Andy Brown UBS Group CTO Client Facing Technologies CIO UBS: One of the leading financial firms UBS draws on its 150-year heritage to serve private, institutional

More information

HP OpenView AssetCenter

HP OpenView AssetCenter HP OpenView AssetCenter Software version: 5.0 Asset Tracking solution Build number: 120 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements

More information

Evaluating IaaS security risks

Evaluating IaaS security risks E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that

More information

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager Jim.wittry@hp.com http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Can Cloud Database PaaS Solutions Replace In-House Systems?

Can Cloud Database PaaS Solutions Replace In-House Systems? Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Linux Continues to Gain Momentum in Enterprise Server Market

Linux Continues to Gain Momentum in Enterprise Server Market Research Brief Linux Continues to Gain Momentum in Enterprise Server Market New research confirms that the server OS is gaining strength for a growing array of critical business applications, driven heavily

More information

Cloud Security: The Grand Challenge

Cloud Security: The Grand Challenge Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and

More information

The Road to Integrated Systems Physical and Network Security Merge to Drive Business Processes White Paper

The Road to Integrated Systems Physical and Network Security Merge to Drive Business Processes White Paper The Road to Integrated Systems Physical and Network Security Merge to Drive Business Processes White Paper www.honeywellintegrated.com Table of Contents Executive Summary...3 The Complexity of System Information...4

More information

Title. Click to edit Master text styles Second level Third level

Title. Click to edit Master text styles Second level Third level Title Click to edit Master text styles Second level Third level IBM s Vision For The New Enterprise Data Center Subram Natarajan Senior Consultant, STG Asia Pacific subram.natarajan@in.ibm.com Multiple

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

Evolution from FTP to Secure File Transfer

Evolution from FTP to Secure File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so

More information

Secure the Web: OpenSSO

Secure the Web: OpenSSO Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based

More information

Don t be misled by misinformation and rumors about Open Source or fall prey to the pitfalls of expensive proprietary solutions.

Don t be misled by misinformation and rumors about Open Source or fall prey to the pitfalls of expensive proprietary solutions. Don t be misled by misinformation and rumors about Open Source or fall prey to the pitfalls of expensive proprietary solutions. GET THE FACTS. The True Cost of Open Source: Open Source SOA & Application

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

Hubspan White Paper: Beyond Traditional EDI

Hubspan White Paper: Beyond Traditional EDI March 2010 Hubspan White Paper: Why Traditional EDI no longer meets today s business or IT needs, and why companies need to look at broader business integration Table of Contents Page 2 Page 2 Page 3 Page

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

Policy Driven Practices for SOA

Policy Driven Practices for SOA Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

Information Security and Governance in ERP Implementation (JD Edwards)

Information Security and Governance in ERP Implementation (JD Edwards) Information Security and Governance in ERP Implementation (JD Edwards) Table of Contents Information Security... 2 Information Security in ERP Environment... 3 J D Edwards Security and Governance Features...

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies

More information

IBM Websphere Application Server as a Service

IBM Websphere Application Server as a Service Government Efficiency through Innovative Reform IBM Websphere Application Server as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS...

More information

Charting a Course to Linux Joe Panettieri Editorial Director, Custom Conference Group Ziff Davis Media

Charting a Course to Linux Joe Panettieri Editorial Director, Custom Conference Group Ziff Davis Media Charting a Course to Linux Joe Panettieri Editorial Director, Custom Conference Group Ziff Davis Media Hello, and welcome to Charting a Course to Linux. My name is Joe Panettieri. I m the Editorial Director

More information

Enterprise App Stores: An idea whose time has come?!

Enterprise App Stores: An idea whose time has come?! Enterprise App Stores: An idea whose time has come?! RSG Webinar " Jan 23, 2014" Kashyap Kompella @realstorygroup Hashtag #RSGWebinar A brief intro to Real Story Group We are a technology research & advisory

More information

COMESA Guidelines on Free and Open Source Software (FOSS)

COMESA Guidelines on Free and Open Source Software (FOSS) COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services

Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services : A Tool for Managing Compliance and Risk in Government Services November 19, 2008 Slide 1 Agenda Problem Space Solution Space Describe the compliance and risk management problem Why is this relevant for

More information

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference

More information

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling. A White Paper Prepared for BMC Software August 2006

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling. A White Paper Prepared for BMC Software August 2006 A White Paper Prepared for BMC Software August 2006 Table of Contents Executive Summary...1 Introduction...1 The Current Standard Agent-Based Scheduling...1 The Revolution Agentless Job Scheduling...1

More information

Alliance AES Key Management

Alliance AES Key Management Alliance AES Key Management Solution Brief www.patownsend.com Patrick Townsend Security Solutions Criteria for selecting a key management solution for the System i Key Management is as important to your

More information

Six ways to accelerate Android mobile application development

Six ways to accelerate Android mobile application development Six ways to accelerate Android mobile application Creating an integrated solution for collaboration among teams Contents 1 Weaving the invisible thread of innovation 2 Android : vast opportunities and

More information

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri. Open Standards Are Dissolving Cloud Silos May 2012 Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.com TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents

More information

SOA Success is Not a Matter of Luck

SOA Success is Not a Matter of Luck by Prasad Jayakumar, Technology Lead at Enterprise Solutions, Infosys Technologies Ltd SERVICE TECHNOLOGY MAGAZINE Issue L May 2011 Introduction There is nothing either good or bad, but thinking makes

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving

More information

Why Linux and OpenStack Make the Most Sense for Virtualization and Cloud Computing in a Multi-Platform Environment

Why Linux and OpenStack Make the Most Sense for Virtualization and Cloud Computing in a Multi-Platform Environment Why Linux and OpenStack Make the Most Sense for Virtualization and Cloud Computing in a Multi-Platform Environment When IT organizations step up their virtualization efforts and begin transitioning to

More information

Case Study: EIfEL Makes E-Learning and Resume Sharing Secure with Liberty Standards

Case Study: EIfEL Makes E-Learning and Resume Sharing Secure with Liberty Standards Case Study: EIfEL Makes E-Learning and Resume Sharing Secure with Liberty Standards The Organization The European Institute for E-Learning (EIfEL) is an independent, not-for-profit association based in

More information

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything

More information

How To Choose A Cloud Computing Solution

How To Choose A Cloud Computing Solution WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.

More information

Free Multi-Factor Authentication. Using Email and SMS in Enterprise/Random Password Manager (E/RPM)

Free Multi-Factor Authentication. Using Email and SMS in Enterprise/Random Password Manager (E/RPM) Free Multi-Factor Authentication Using Email and SMS in Enterprise/Random Password Manager (E/RPM) The controlled release of sensitive credentials in a privileged identity management (PIM) system requires

More information

Ten Myths of Cloud Computing. Gene Eun Sr. Director Product Marketing, Cloud September 29, 2014

Ten Myths of Cloud Computing. Gene Eun Sr. Director Product Marketing, Cloud September 29, 2014 Ten Myths of Cloud Computing Gene Eun Sr. Director Product Marketing, Cloud September 29, 2014 Oracle Confidential Internal/Restricted/Highly Restricted Safe Harbor Statement The following is intended

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

The Benefits of Commercial Open Source

The Benefits of Commercial Open Source The Benefits of Commercial Open Source Empower your Audience This white paper explains how and why Enterprises significantly benefit from Commercial Open Source solutions. The Commercial Open Source model

More information

The Software-defined Data Center in the Enterprise

The Software-defined Data Center in the Enterprise The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive

More information

White Paper. Low Cost High Availability Clustering for the Enterprise. Jointly published by Winchester Systems Inc. and Red Hat Inc.

White Paper. Low Cost High Availability Clustering for the Enterprise. Jointly published by Winchester Systems Inc. and Red Hat Inc. White Paper Low Cost High Availability Clustering for the Enterprise Jointly published by Winchester Systems Inc. and Red Hat Inc. Linux Clustering Moves Into the Enterprise Mention clustering and Linux

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Cloud-based business innovation, transformation, and the future of enterprise IT

Cloud-based business innovation, transformation, and the future of enterprise IT Cloud-based business innovation, transformation, and the future of enterprise IT Professor Marco Iansiti David Sarnoff Professor of Business Administration Harvard Business School May 3, 2011 Copyright

More information

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support

More information

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Mat Keep MongoDB Product Management & Marketing mat.keep@mongodb.com @matkeep Agenda Data Security Landscape and Challenges

More information

Understanding Object Storage and How to Use It

Understanding Object Storage and How to Use It SWIFTSTACK WHITEPAPER An IT Expert Guide: Understanding Object Storage and How to Use It November 2014 The explosion of unstructured data is creating a groundswell of interest in object storage, certainly

More information

Cloud for Your Business

Cloud for Your Business Whitepaper Red Hat Enterprise Linux OpenStack Platform A Cost-Effective Private Cloud for Your Business Introduction The cloud is more than a marketing concept. Cloud computing is an intentional, integrated

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

The top 5 truths behind what the cloud is not

The top 5 truths behind what the cloud is not Citrix Cloud Solutions White Paper The top 5 truths behind what the cloud is not Separating the noise of what cloud is and what it s not 2 It s clear that the cloud represents the biggest technology disruption

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information