Sustainable Enterprise Architecture: 1st Edition (Hardback) book cover

Sustainable Enterprise Architecture

1st Edition

By Kirk Hausman

CRC Press

304 pages | 43 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781439821541
pub: 2011-03-10
$100.00
x
eBook (VitalSource) : 9780429104022
pub: 2011-03-10
from $50.00


FREE Standard Shipping!

Description

Enterprise architecture requires an understanding of all technologies, strategies, and data consumption throughout the enterprise. To this end, one must strive to always broaden knowledge of existing, as well as emerging trends and solutions. As a trade, this role demands an understanding beyond the specificities of technologies and vendor products. An enterprise architect must be versatile with the design and arrangement of elements in an extended network enterprise.

Intended for anyone charged with coordinating enterprise architectural design in a small, medium, or large organization, Sustainable Enterprise Architecture helps you explore the various elements of your own particular network environment to develop strategies for mid- to long-term management and sustainable growth. Organized much like a book on structural architecture, this one starts with a solid foundation of frameworks and general guidelines for enterprise governance and design.

The book covers common considerations for all enterprises, and then drills down to specific types of technology that may be found in your enterprise. It explores strategies for protecting enterprise resources and examines technologies and strategies that are only just beginning to take place in the modern enterprise network. Each chapter builds on the knowledge and understanding of topics presented earlier in the book to give you a thorough understanding of the challenges and opportunities in managing enterprise resources within a well-designed architectural strategy.

Emphasizing only those strategies that weather change, Sustainable Enterprise Architecture shows you how to evaluate your own unique environment and find alignment with the concepts of sustainability and architecture. It gives you the tools to build solutions and policies to protect your enterprise and allow it to provide the greatest organizational value into the future.

Table of Contents

The Impact of Enterprise Architecture

Simple Choice, Complex Impact

A Strong Hand

Opportunity Costs

Ripples in the Pond

Where the Only Constant Is Change

Lilliput and Blefuscu

Open Source and Open Standards

The Best Solution

Enterprise Planning

Beyond Platform Selection

Where Lies Success?

The Architect

The Chief Architect

The Lead Architect

The Business Architect

The Technology Architect

Outsourced Architecture

Multiple Architects

Creating a Symphony

Governance

Architectural Models

Project and Program Management

Beyond Basics

Language Standard

Operational Environment

Virtualization

Mobile Technologies

Service-Oriented Architecture (SOA)

Whatever’s Next

Resources

Enterprise Architecture Challenges

Complexity

Sources of Complexity

Opposition to Standardization

Enterprise Information Management

Sell the Value of Information

Avoid Drawing Fire

Look Beyond the Project

Align Technology and Business

Data Center Management

Consolidation

Automation

Virtualization

Plan for the Worst and Hope to Be Wrong

Finding Value

Impact and Return on Effort

Applying the 80/20 Rule

Expectations from Architectural Change

An Objective View

The Federated Enterprise

Legal Mandates

Alphabet Soup

Discovery and Retention

Extended Legal Involvement

Managing Risk

Beyond the End

Planned Obsolescence

Hidden Obsolescence

Good Enough Architecture

Managing Identity

The Many-Walled Garden

Identification

What You Know

What You Have

What You Are

Multifactor Identification

Authentication

The Authentication Directory

External Authentication

Authentication Standards

Single Sign-On

Authorization

Access Controls

Identity Management

Regulatory Mandates

Business Drivers

Identity Management Elements

Identity Management Providers

Identity Management Strategies

Implement Strong Identification

Combine Authentication and Authorization

Assign Rights to Groups

Employ Identity Management Solutions

Simplify the Garden

Sharing Information

The Value of Communication

Communication Systems

Network of Trust

Collective Intelligence

Communication Technologies

Asynchronous Communications

Synchronous Communications

Telepresence

Combined Collaboration

Groupware

Portals

Beyond the Boundary

Storing Information

Everything in Its Place

File Storage

Logging

E-mail

Repositories

Virtual Computers

Storage Policies

Scouting the Land

Areas of Interest

Data Protection

Backups

Media Retirement

Making Connections

What Came Before

The World Wide Web

Web 1.0

Web 2.0

Web 3.0

Culture

The Needle in the Haystack

Ranking

Caching

Bogus Information

Name Squatting

Typos and One-Offs

Name Service Poisoning

Inter, Intra, and Extra

Internet

Intranet

Extranet

Anytime/Anywhere Computing

Mobile Technologies

New Technologies

Network Connectivity

Extending the Enterprise

Accessibility

Mobile and Remote Access

Mobile Limitations

Remote Desktops

Transport Security

Kill Pills

Device Interaction

Signal Boosters

Policy Requirements

Virtualization

Virtualized Services

Virtualized Applications

Virtualized Desktops

Remote Desktop Clients

Virtual Appliances

Virtualized Servers

Virtualized Networks

Cloud Computing

Comparing Cloud and Traditional Application Life Cycles

Types of Clouds

Cloud Flexibility

Best Practices

Enterprise Sustenance

Project Management

Hardware

Firmware

Drivers

Components

Tech Refresh

Software

Testing

Deployment

Update

Directory Entries

Passwords

Enterprise Security

The Process of Security

Security Is like an Onion

Program Rather than Project

Explain Why

Standardize and Simplify

Common Enterprise Threats

Load Only in the Nursery

Secure the Network

Secure the Data

Secure the Applications

Defend the Enterprise

Malware Defense

Network Protection

Defense Against the Unexpected

Emergency Response Planning

Don’t Forget the Little Things

Recovering from Disaster

Continuity of Operations Versus Disaster Recovery

Continuity of Operations (COO)

Disaster Recovery (DR)

Planning for Recovery

Business Impact Analysis (BIA)

Risk Assessment (RA)

Construct a Plan

Technology in Recovery Planning

Alternate Data Center

Alternate Equipment

Alternate Communications

Future Computing

Bigger Is Better

Supercomputing

Distributed Computing

Grid and Cluster Computing

Volunteer Computing

Grid Computing

Cluster Computing

Distributed Computing and the Cloud

The Sustainable Enterprise

Equipment Replacement and Disposal

Energy Options

Reducing Consumption

The Right Location

Index

Each chapter concludes with a Summary

About the Author

Kirk Hausman is employed as an Assistant Commandant at Texas A&M University and specializes in project management, enterprise architecture, IT governance, security and business continuity, information assurance, and regulatory compliance. He has a background that includes digital forensics, WMD/wide-area disaster response planning, pandemic response planning, and technology audit practices in higher education, corporate, and health care venues. His experience includes application design, data resource management, network architecture, server and storage virtualization, strategic technology modernization, network and backup centralization, research computing, and large-network business continuity/disaster recovery planning.

With a Master’s degree in Information Technology, Mr. Hausman has served as a senior research scientist in the fields of cyber terrorism, cybercrime, and cyber security. He lectures regularly on the uses of technology in education, solutions for persons with disabling conditions, and strategic architectural planning to improve enterprise efficiencies. Mr. Hausman has served as a subject-matter expert before both Houses of the Texas State Legislature and has more than 20 books currently in print, together with numerous articles and white papers addressing enterprise architecture, cyber terrorism, and IT governance. His professional certifications include the CISSP, CGEIT, CRISC, CISA, CISM, and CCP, together with a wide assortment of technology- and regulatory-specific designations.

Subject Categories

BISAC Subject Codes/Headings:
BUS087000
BUSINESS & ECONOMICS / Production & Operations Management
COM032000
COMPUTERS / Information Technology
COM043000
COMPUTERS / Networking / General