Category Archives: Work

Writings on being an Enterprise Architect / I.T. Architect in academia.

Architecture and finding the path

Ron Kraemer, our VP of Information Technology and CIO, spoke at the IT Leaders Program this week. He built on his blog post, Interdependence – Both Positive and Negative. To paraphrase:

The growing interdependence of our systems is driving the complexity of our systems towards the edge of chaotic systems. The choices that we make are no longer focused on finding the perfect solution. Instead, we can see many possible solutions, many of which are good solutions. The choice is then to pick the solution which builds positive interdependency and limits negative interdependency.

Interdependency and Complexity

Fig. 1: Growing interdependency has put us at the edge of complex and chaotic systems.

In his talk at ITLP, Ron also pressed on the ever-growing rate of change. These two factors limit our ability to design and implement perfect solutions to problems. To paraphrase again:

If you take two years to design a great solution, the landscape will have changed so much that the solution may not be applicable. The level of complexity makes finding and defining the perfect solution even more difficult. The level of interdependence means that even more good solutions are available – when many systems are connected, many systems could be used to provide the solution.

Impossible Route to a Perfect Solution

Fig. 2: Impossible Route to a Perfect Solution

I agree with what Ron has come to believe. The level of integration between systems is very high. The expectation for real-time interactions has become the norm. Users expect to see real-time flight information. They expect real-time updates on openings in courses. Students can see, in real-time, the bus schedule, where they are located and the location of nearest bus stop and the location of the buses on their routes.

This interdependence has driven complexity to the point where perfect solutions are hard if not impossibly to design and deploy. Therefore, we must choose from many good solutions that exist. We need to act quickly to implement some solution to meet the rapid rate of change.

Many good solutions

Fig. 3: Many good solutions

This is where Enterprise Architecture and the other architecture practices can help. If we look out to the future and think about the desired state, then we can begin to sift out those good solutions which move us towards that future state. For us, we had stated that Service Oriented Architecture was a strategic direction. That bounded the future state some. In the student area, we had a future state process diagram. This diagram outlined improvements to the way that students manage course data and move through finding courses to enrollment. This put another boundary on the future state. When it came to think about how we get course roster type information out to a new learning management system (Moodle), we were able to use that projected future state to pick from the possible solutions (flat file transfer, shared database connections, web services) those which moved us closer to future state.

Architecture filtering the good choices

Fig. 4: EA can help filter the good choices that move you towards the desired future state.

The rate of change and interdependency drives the importance of an architectural approach. If you have not thought about the future state, then there is a multitude of choices. To pick from many choices, you have to establish some factors that affect your selection. In a restaurant, this might be dietary restrictions, cost, the weather outside. In technology, it is often quickest and cheapest. But those factors, in this complex environment are often shortsighted and misguided. The quickest and cheapest solution might need to be replicated many times for many systems. This would increase the interdependency in a negative way and push you even closer to a chaotic system. A more expensive, slower solution might serve you well over the long haul.

Architecture can help you make those choices in a framework that is focused on the future and on the overall complexity that you are creating. Enterprise Architecture (and the other architecture practices) can help sort those good solutions and help make sure the choice you make is along the path to desired future state.

SOA – Maturity is Key Presentation, EDUCAUSE Enteprise 2009

My presentation on SOA in the Enterprise – Maturity is Key has been posted in a couple of places.

First, on the EDUCAUSE site is the talk listing:

EDUCAUSE – Enterprise 2009 Site

Slides can be found at Slideshare.net:

Blue Sky to Ground part 1

 

 

Soaring

Soaring

I’ve been working with our CIO on the I.T. strategic planning initiative.  At the same time, I’ve been working with the Technical Directors and Operational Directors on planning at the technology level.  They have been creating a map of what technologies are used to support our services.  I’ve had my head in the blue sky of the strategic planning process while I’ve also had my hands in the dirt of the technology mapping.   I keep coming up against the issue of how to connect the blue-sky of the strategic plan with the down-in-the-dirt technology planning.

Finding a process and methodology to connect the sky to the ground has taken up a lot of my mental cycles recently.   The following is my take on a method to connect the strategic planning to the technology planning. 

1.  Strategy to Capabilities

The first step is to take the general directives of a strategic plan and have them expressed in terms of capabilities.   I see this work being done by leadership as part of a collective planning exercise.   As an example, a strategic initiative might be: Classrooms and learning spaces will be equipped with a base set of instructional technologies.   This strategic direction then needs to be interpreted into a set of defined and measurable capabilities.    A leadership team would be charged with determining the capabilities that would meet this strategic direction.  The capabilities should be measurable.

For example, the capabilities might be:  Multimedia Projection, Student Response Measurement and Lecture Capture

We could survey all rooms and learning spaces and get measures of current state (for example: 65% of rooms meet the projector capability, 15% meet the student response and 10% meet the lecture capture capability).   We could then decide priority – which is more important lecture capture or student response – act on those priorities and measure improvement.

2. Capabilities to Services

The next part of this to map our services to the strategic capabilities.  Some services support multiple capabilities (Hosting Services, Identity Management Services for example).  Some capabilities may not have a supporting enterprise service.  A capability that does not have a set of supporting services might indicate a gap in the enterprise.  For example, there may not be a matching Lecture Capture Service that provides the Lecture Capture capability.  This might be done in an ad hoc fashion or it might be missing completely.  This gap in the enterprise service would be worth evaluating to see if the capability is being delivered effectively in the current structure.  If not, then we might want to look at developing an enterprise-wide Lecture Capture Service that supports all of the classrooms.  

3.  Services To Technical Roadmaps

This is where we use the brick diagram in our planning.  The brick diagram captures the technologies that support a given service.  The brick captures what is current state (those technologies currently in use), what is tactical (what will be used for the next 0-2 years), what is strategic (on the plans to use 2-5 years out), what is in containment (no new development), what is in retirement (being stopped) and what is emerging (interesting trends that may move into the tactical or strategic realms in the future).  

These brick diagrams are created and maintained by the service owner – that is the group that manages the service being provided.  The bricks let the service owners and the service teams grab a snapshot of their current state and their strategic plan for the next few years – what they will leverage, what they will stop, what they are watching and what they want to move to – in a simple format.

 

Core Planning Stack from Tech to Strategy

Core Planning Stack from Tech to Strategy

This set of relationships is managed by a set of governance process that define and prioritize the layer below.  

At the lowest level, the service manager or service team usually defines and prioritizes the technology they use to deliver that service.   This is the layer that is captured in a brick diagram.  They should also describe the capabilities that are delivered by their service and which strategic directions they support.  

At the top level, senior leadership should work to refine the strategic directions as measurable capabilities that want to see delivered.  

The mid-level governance is a gap in our institution.  It is probably filled by project prioritization processes and budget processes.  I’ll talk about that in part 2 of this post.

Uncommon Thinking…

From the Flickr stream of Bre_Pettis

From the Flickr stream of Bre_Pettis

 

I was chatting with a colleague about the new EDUCAUSE slogan, “Uncommon Thinking for the Common Good” when I realized that the saying encapsulates one way to think of my work as an I.T. Architect.  “Uncommon Thinking for the Common Good” is what I try to foster in the teams that I work with.  I’ll explain this in two parts “Uncommon Thinking” and “for the Common Good”.

Uncommon Thinking:

I try to break people out of their daily routine and their comfort zone.  For instance, I have sat in meetings where a team is supposed to develop a new user interface (UI) for a new application.  I’ve watched as team redraw the UI for the old application, that they use day-in and day-out, as the solution for the new system.  I’ve also seen teams “re-think” how a business process could be done.  The end result was an automated version of the current process.  The new implementation of the old solution substituted emails for people running around with paper.  They are following the same steps, replicating the same authorizations and sending the same forms often without asking “why this form” or “why this person” or even “is this necessary at all”.   My job is to get them to question their old ways of doing things.

People like what they know.  They understand what they use daily.  But advancement comes when we change and disrupt routines, not when we replicate them into a new technology.  You have a telephone book at home with White Pages for people and Yellow Pages for businesses.  Changing that into two Word files you can print doesn’t bring great advancement.  It might be easier to carry only the pages you need but that doesn’t really improve the process.  Search capabilities are a big improvement.  Rethinking how you use the information, such as mapping businesses onto maps so you can find restaurants near your hotel, that brings advancement.  The routine of grabbing a book and looking something up is thrown out.  The new routine is to grab a laptop, look for wireless and Search.

I often introduce myself to new teams saying that my job will make them uncomfortable because I will ask them to throw out what they know and what they are comfortable with.  I tell them I will challenge their assumptions.  I say this not because their assumptions are wrong but to make sure their assumptions are correct and we accept them for the right reasons.

I love the fact that the Web 2.0 explosion is going on.  There are so many examples of “other ways to do things”.  I bring these examples and ask, “why can’t we do this instead?”  I show them Netvibes and ask, “can we make our pages this flexible?”  I show them Etsy’s Find By Color page and ask, “can we make creative ways to search like this?”  I show them The Northface catalog and ask, “should we have filters to help people search like these?”

 

Etsy Color Browser

Etsy Color Browser

 

 

It’s not that I think we should have a UI that looks like any of these sites but I want to break the team’s mindset and get them to start thinking about all of the rich possibilities.  I want them to work with a blank canvas and a rich palette of colors.  I want them to really get imaginative in their solutions to the problems.

I had a watercolor instructor that I worked with at UC Santa Cruz.  We were painting in the woods one day.  Everything I produced came out flat, boring and uninteresting.  They were awful, actually.  I was having a terrible time.  He came by, had a look and asked how it was going.  I grunted out my disgust.  He said, “Give me three paintings, but you can’t use any browns or greens at all. No earth-tones.”  I’m sitting in a forrest of browns and greens.  I was forced to paint purple and blue trees and red ferns.  At first it was very uncomfortable and I was very hesitant.  The first attempts were also awful.  But then, it became fun and playful and the paintings improved.  I was forced to let go of “how it is” and instead I had to play with “how it could be”.

That is the uncommon thinking of the Architecture practice.  Letting go of the how it is and thinking about how it could be when we start with a blank canvas and rich palette.

For the Common Good:

The other aspect that I deal with on teams is the narrow focus of their solution.  Often, the solutions that are put forth solve the very local needs of the group of people sitting around the table.  My work is to ask, “how does this fit with the broader issues that the people deal with daily?”  “What does this solutions do to actually help people?”  “What impact will this have on them?”  Not all solutions should be broadened and generalized to solve a larger issue but we should consider their larger impact. 

Every application must fit into an already rich application environment.  No application is truly a silo-application anymore.  Someone has to use it.  That someone already has a username and password if not several.  That someone already has a day that is full of tasks and applications.  That someone has things that don’t work so well, things that they are comfortable with and things that they cherish dearly.

The impact assessment of a new solutions should consider all of those people that the solution will effect.  If the new process changes their lives from reading paper documents to reading email, the users might not consider it an improvement.  What if reading the paper documents is what they do on the train in the morning?  Then your solution is a step backwards for them.  What seemed like a good idea to the team, reduce paper and use electronic delivery, actually was negative impact to the user and to overall productivity.  The user did that work before they got to the office as part of their daily routine.

This is part one of the “For the Common Good” part of my job. The solution that is delivered needs to take into consideration all those that will be impacted and it needs to fit into their lives and, ideally, change their lives for the better.

The second part comes into play during information gathering and sharing about the solution.  The new application or solution needs to be described in terms of the business value and the overall positive value of the change.  If you are going to add work to busy departmental staff, then it better be for something more than “your system”.  It better be for something like improving the enrollment process for students.  It better be for some larger good than simply benefitting the group developing the solution. You need to gather the business process improvements that the new solution will provide and then use those improvements to describe why the solution is important.

The final part has to do with scope.  Often, issues in one group are problems in another group too. Finding co-sponsors is a way of expanding the positive gain for the new processes or solution.   I spend time looking for others who I can bring into the discussion.  I look to see if the problem can be solved once for several constituents.  The broader solution will require collaboration and compromise but it can bring greater value and reduce the chaos of one-off solutions.  If the problem is solved once for many groups, then there is only one solution to maintain and there are many people who can provide input and expertise.

For me, “for the common good” means considering the broad impact, looking for the greatest value and delivering a solution for the largest constituency.  

Uncommon Thinking for the Common Good:

Bringing this all together provides one view on what I do as an I.T. Architect.  I get people to think broadly about a solution.  I get them to use a blank canvas and a rich palette of ideas when thinking of how we should solve a problem.  I also get them to think about how that solution fits in the larger environment, who it will help and who it will impact and finally who else should be brought into the discussion so we can deliver a far-reaching solution.

If I do my job well, then we get truly creative and expansive solutions that fit into the organization, improve peoples lives and help the greatest number of users.

 

Technorati Tags: , , ,

ITANA.org – bringing the catch home

 

Image courtesy of the Nova Scotia Museum

Image courtesy of the Nova Scotia Museum

I’ve been pondering, wondering and worrying about how to bring value out of ITANA.org to the world at large.  I struck upon a metaphor over dinner with a friend at EDUCAUSE recently that brought my vision and the issues I’m pondering into sharp light for me at least.

 

I watched Captains Courageous, a wonderful 1937 film with Spencer Tracy, recently.  This is a story about a spoiled boy who ends up on a fishing Schooner.  The schooner would launch dories with fishermen aboard them.  The dories would bring there catch back to the schooner where the fish would be processed and packed.  The schooner would then bring the catch back to the mainland and to the public.

ITANA.org spins up sub-groups that work on a topic.  These are the dories if you will.  ITANA.org and its sponsors, EDUCAUSE and Internet2, act like the schooners and the delivery systems on the mainland. 

If I take this as the operating principle for ITANA.org, then a variety of questions pop into my head:

  • How do I make sure those sub-groups have the resources needed to bring back a meaningful deliverable? 
  • Who should be, as it were, on the dory doing the fishing? (It’s my metaphor and I’m sticking with it to the end – Jim) 
  • How do I make sure that the delivery from the sub-group to ITANA.org is a smooth as possible and as efficient as possible? 
  • How do I make sure that the sub-groups are working in fertile fishing grounds?
  • How do I make sure that what we are delivering is what the mainland wants?

These are the things that I’m wrestling with as I get ITANA.org up and running.

I see a lot of interest and potential in the bright minds that participate in ITANA.org.  We have great conversations.  We generate interesting thoughts an comments.  Those thoughts and comments get lost in the minutes from the phone calls or the hallway chats or the blog posts and notes from meetings.  How do I turn those things into more meaningful deliverables?

Some thoughts that I’ve had on this topic:

  • Each sub-team should have one person dedicated to gathering up content.  They should pull responses out of the minutes and into a wiki page or section.  They should glean the good stuff from the email chatter and add it to the wiki.  They would be responsible for rolling-up all the various bits and pieces that go by into a single reference point.
  • Each sub-team should have a set of deliverables as part of its charter.  For example, the Data Management sub-team agreed to deliver a survey and the survey results.
  • Each sub-team should produce some artifact(s) that can be shared with the world at large (e.g. a paper, or video or blog post) that others can consume on their own time.
  • I/we should have a standard way of “publishing” these deliverables and a standard set of ways of getting the news out that they have been published.
  • We should also be creative in our thoughts about how we engage beyond the core of ITANA.org.  Where does Twitter, Facebook, LinkedIn, the EDUCAUSE blogs and wikis, podcasts, screencasts, vodcasts, etc. fit into the mix?

That’s what I’ve been pondering.  Anyone have input?  I’d love to hear it.

Technorati Tags: , , , , ,

Brick Diagrams and related planning tools

 

Brick Diagram

Brick Diagram

Brick diagrams are a strategic planning tool that I mentioned in passing in my ITANA talk at EDUCAUSE.  Since then, I’ve had several people ask for more information.  So here it is… more information.

 

Brick Diagrams are used by NIH in their Enterprise Architecture planning process.  You can see the NIH brick diagrams and their taxonomy for the brick diagrams on the NIH EA Site.

Other institutions use similar planning tools.  Read on to see links to other places that use something similar and to download slides for a talk about Brick Diagrams that I gave to our Management Team.

Continue reading

SOA from the Registrar’s Perspective

Just had a hallway (okay, exhibit floor conversation) with Tom Black of Stanford University.  They have ideas on embedded enrollment functions in several places: inside their LMS, available via iPhone applications and elsewhere.  They would expose those enrollment functions as services then write to those services.  Interesting.  We also talked about orchestrating a flow, click on the drop button and you are passed to a short survey to see why you dropped.

This brought me back to the question in our session “Is SOA DOA?”.  I was asked how you get business leaders to buy into the SOA change and how do you get campus consumers to agree to work on SOA solutions.    Add to this the discussion with Karen Hanson, our Associate Registrar, on funding issues and how do we deal with costs of deploying SOA solutions.

It seems that there is a lot of interest in SOA in the Registrar’s world.

We may try to organize a meet-up after AACRAO in Chicago in April.  We could have Registrars bring their Architects for discussion around uses of SOA and issues with implementing, supporting and governing SOA.  It would also be good to hear their interesting Case Studies of how they are using SOA .

Things to follow-up on when I get home.

Technorati Tags: , , , ,

CG Leaders Meeting @ EDUCAUSE 2008

Introductions of people.  A lot of interesting constituent groups that I didn’t realize existed:  I.T. Metrics, Learning Space Design.  http://www.educause.edu/groups

Cynthia Golden – VP for EDUCAUSE is doing the EDUCAUSE update.

There was a new President last year.  They have been doing a lot of change management over the past year.  There is a new look-and-feel.

“Uncommon Thinking for the Common Good” is the new tag line.    “It’s not about information or technology. It is what we do with them that counts.”

EDUCAUSE this year is 10 years old.  They did a lot of information gathering this year – focus groups, surveys and webcasts.  Feedback: EDUCAUSE as an organization brings I.T. leaders and decision makers together.  It elevates the idea in the tag line.

Things they heard:  Be a voice for higher education, stay ahead of the trends, influencer or creator…

Diana Oblinger has an article in the most recent EDUCAUSE Quarterly.

Areas of focus: 

  • Teaching and Learning,
  • Managing the Enterprise,
  • E-Research and E-Scholarship,
  • Evolving Role of IT and Leadership

They are working towards more interactive sessions (Point-Counterpoint sessions), lighting rounds, innovation showcases.  They want to provide greater support for informal networking (informal spaces, powers stations).  And, they are focusing on sustainability – self-selection of tote materials, carbon offsets.

Peter DeBlois update on the program participations.

Grown by 5 CGs.  Increased subscriptions by 16%.

Project Management was a new CG two years ago and they are now in the top 10.

The 5 new CGs:

  • Emergency Communications (130 members)  – focused more on the technology
  • IT Communications (165) –
  • IT Metrics (164) – want to find standard metrics and working on ways to implement the ways of gathering the metrics.
  • Openness (106) – Covers Open Source Software, Open Content, Open Decision Making.  It is a broad scope from the very technical to very high level discussions.
  • Virtual Worlds (128) –
  • Women in Higher Education IT will start after this meeting

CG Leadership Ideas – Issues and Concerns

How do you stimulate discussions?  Put compelling topics on the table. 
How do you glean out the useful discussions and move them to another deliverable?

Ask each year if the group wants to continue to exist. 
Task multiple people to drive a topic area of conversation.  Tie this to deliverables.
Contacting people behind the scene to ask them to provide more information to the list.
Try to align a topic on the list with a conference submission.
Going to try to Skype out their CG meeting to reach a broader audience who cannot travel.
Trying some new media approaches.  They weren’t too keen on the idea.

Corporate and Media Participation:

Seems to be in control.  People are worried most about media taking quotes off the list and publishing them.

Adobe Connect et al:

They now have Adobe Connect licenses that the CG could use for on-line meetings.  You can have 1500 users.  Voice-over-IP with slideshows and raise-your-hand chat for questions.  We don’t have a toll-free number to call into the conference.  It is all VOIP.  It has capture and stream capabilities.

Interested in using this, send an email to Catherine Yang.

Surveys:

They have looked at an institutional Survey Monkey account.  It would be good to have an archive.

Other ideas:

Spotlight a CG every month or so to help promote the CGs.
Have library interns work on pulling together content from the email lists.
There is interest in regional CG meetings.  They are working out the details of how to facilitate that.

Technorati Tags: ,

Advanced CAMP – Part 3

Merri Beth Lavagnino – Privacy and Policy

Policy and privacy are really consideration of the human aspects and impacts of technology.  Policies are: strategic direction and operating philosophy (which are usually informal and cultural), Public and Institutional policies (these are both documented and usually legal documents).

Institutional policy – a statement that reflect the philosophies and values of the project, service, organization or federation.  Policies should be clear and concise, applicable across a wide range of activities and should not change very much.

Why create a policy?

  • When reasonable people disagree
  • To guide thinking when making decisions
  • To correct repeated misbehavior
  • When there are significant risks or liabilities
  • In response to external forces like regulation or law

Where does the policy apply?  Federation, Institution, Service

Real-life stories:

  • Email Outsourcing:  vendors proposed that we would do incident response and legal requests for both students and alumni.  There was no policy that said they had to be in charge and n control.  She took the discussion back to the original goals for the project. (1) Improve and add services for students and (2) reduce their costs.  So they did not take on the incident response because that would not reduce the costs.  That was the policy that helped inform the decision.
  • Course Management System:  they changed their course management model.  They began to get incident reports because the new service didn’t match the old policies for the previous system.
  • Virtualization:  They moved to a new virtualized systems.  The old policies where around knowing that super-hot data is on a specific machine, with a specific system admin.  Now, they didn’t know what machine had the data and all sys admins might have access.  Had to expand training and the understanding of how they would manage super-hot data.
  • InCommon Agreement:  Thought that went very well.

“A policy is a temporary creed liable to be changed, but while it holds good it has got to be pursued with apostolic zeal.”  Mohandas K. Gandhi

Privacy:

Categories of privacy harms:

  • Intrusions : They come into your space and contact you and tell you what to do (spam, cold calls)
  • Information Collection:  They watch what you are doing more than they should (tracking, interrogation, etc)
  • Information Processing:  They have a lot of data about you, and they do things with it. (data mining)  Need to watch out for secondary use – collect for one reason then use it for another reason.
  • Information Dissemination:  They disclose data about you, perhaps more than you think they should.  (Transferring data, true or false facts)

Fair Information Practice Principles:  The FTC drafted these principles and they do enforce them.  Higher Ed is not under the FTC’s jurisdiction but users are expecting these principles to be met.  If we don’t

  • Notice/Awareness:  User should be given notice of your information practices, in order to make an informed choice about whether to provide information.
  • Choice/Consent:  User should be given options as to how any personal information collected from them may be used.
  • Access Participation:  Users should be given access to the data held about them, and ability to contest that data’s accuracy and completeness.
  • Integrity/Security:  data should be secure and accurate
  • Enforcement/Redress:  there should be a mechanism in place to enforce fair information practices and it should include appropriate means of recourse by injured parties.  At a minimum, you should right the wrong.

Ken Klingenstein: Federated Identity and Data Protection Law

Good quote from Ken K:  “This is an attempt to bring trust to internet via technology not just because it is just us chickens”.
EU Law Directive 95/46/EC :  You can process personal data when it is required to perform contact, required to satisfy legal duty or consent.

Identity Providers must identify which services are necessary for education and research.  Must inform the users.  May seek users’ informed freed consent to release personal data to other services.  You have to show why it is important.    Should have a data process/data controller agreement with all service providers to whom personally identifiable data is released.  Must ensure adequate protection of any data released to services outside the EU.  We have to play by the EU rules.

Service Providers must consider whether personally identifiable information is necessary for their service or whether anonymous identifiers are sufficient.  You may request personal information from users but you must inform.

There is no normalized definition of what Personal Identifiable Information (PII).  There are questions about email addresses:  if it is a third party email address it might not be but a .edu address might be.  So the content might be more important than the field.

IP Addresses – if it is a dynamic address it is not PII.  So, unless you know it is a dynamic address, then you have to treat it as PII.

EduPerson Targeted ID – this is going to the EU privacy commission this Fall.  It is a 32 bit opaque identifier that is different per site visited.

OASIS Cross-Enterprise Security and Privacy Authorization (XSPA) – just formed group.  A mechanism to allow consent agreements flow with data.  The first and dominant Use Case is health care.  Looking for other Use Cases.  Does this make consent a new service in our loosely coupled service?  Do services need to be consent aware?

Report Out from Discussion Sessions:

Data Modeling Group:

Modeling person and organization data.  Modeling of organization data is remarkably difficult not just in the nature of the data but also in the resistance that you get from organizations to being characterized.  Multiple organization charts – financial, hr and reporting structure.  The characterizations can be political.  Are there pressures that will lead to the marginalization old way of doing things?  Organizations that don’t want to be characterized may not get services.

Service Discovery:

What would a service description look like:  what is it called, cost, how to call it, operational context (where is it physically located).  Discussion about how you describe the service, how do you recognize similar services in distributed locations.  Talked about the grid is doing this with their RNA.

What is happening today: people using Google to search for services and looking for a WSDL.

How do you get consent?  What about promises and claims?  What about a directory of all the services?  What about a directory of directory?  You could have a convention for naming the directory so you could at least find the directories.

DNS works for finding things.

Governance:

Domain Governance – governance revolves around an application or a data element, or attribute (student ID).  These models will have to evolve to domain governance: enrollment, IdM etc.

Who owns the data especially as the data is transformed and sent along the ESB?  Services are requesting the data that can then be used by other services.

SLAs – keeping tracking of who can use the use the service.

The need for a directory of services especially in emergency notification.  There is also a need to know who is consuming services so you can notify on changes.

What is being done now on campuses?  It is evolving on campuses.  Identity and Access Management is a domain that is being governed  as a domain at Penn State.

Saint Louis University has a good examples of domains in higher education that need to be governed as a domain.

Lightening Talks:

Rob Carter:  Tracking and Authenticating IP in Cyberspace

We had all of our resources stored inside the walls of the institution.  We now see with cloud computing and Web 2.0 applications, our intellectual property out in the cloud.  How do we track the reuse of them?  How do we contextualize the content.

How do we know that it is really and artifact of mine and not someone spoofing my creations?

Could solve this with digital signatures.  What if we could add metadata before it goes out into the cloud.  Get a signature of the object and attach the signature to the object or store it elsewhere.

How does this align with Creative Commons licensing efforts.  You can search and crawl for for CC licensed objects that you use.

Loretta Auvil:  Music Analysis.

Dynamic analysis of a Tom Lehrer file.    Very entertaining.

Scotty Logan:  IAM Services and Well Behaved Apps

If every app does its own thing, there is no real management.

Trust the container:  Identity – you can get a user name from Tomcat et al, Authentication, Authorization

Have the container provider the groups and privileges as a URI

OAuth.net – a specification developed by a group to solve the “I want my Flickr protected photos on Facebook but I don’t want to give you my Flickr username and password”.

Technorati Tags: , , ,

Advanced CAMP – Part 2

Dave Gimpl:  Computing as a Service

Infrastructure for vaporware.  They are working on the infrastructure that enables cloud-computing.

Challenges in the data center:  rising costs of the operations, the explosion of data, the difficulty of deploying new application and services, the difficulty in managing complex virtual machine systems.  When you map the business processes, they map to a variety of systems on the data center floor.

Blue Cloud is IBM’s entry in Cloud Computing.  Cloud Computing is holistic systems management.  Similar to Grid or Cluster computing.  A combination of “pervasive virtualization” for both server and storage.  Allows for virtualization across varied hardware (I think).  On demand and autonomic management and Utility Computing (Amazon’s service offering).

They gather up like systems (not necessarily identical) and manage them as a pool.  The focus changes from managing the SAN or server.  You let the “ensemble” manage itself and you manage the Virtual Image.

When the image moves to another system, does it move with state?

North Carolina State’s implementation is open source.  All of the standards are open source.  The ensembles are wrapped with SOAP/SOA interfaces.  At North Carolina State Virtual Compute Lab – a student can request a XP machine to do their project.  They get the machine in increments of 30 minutes.  They are providing service for other institutions in their area.

Ken Klingenstein mentions a paper “The Computational Data Center: The Science Cloud”

Mark Morgan:  Genesis II – Accessible, Standards Based Grid Computing

http://www.cs.virginia.edu/~vcgr

The problems:  we have target grid user that are unable or unwilling to learn new programming tools & paradigms.  Users want the benefit of the grid without having to know about the grid.

Anything you can put a service in front of and put on the internet, is part of the grid.  Telescopes, microscopes, computing power, storage, data, sensors.

Want to share this but sharing in a mutually distrustful domain.

Genesis II implements the standards that come out of the OGF (Open Grid Foundation) to test them and vet them.  Open Grid Service Architecture is part of the OGF.

Grids have been around for a long time but they are being used.  People who design grids want cool features.  User don’t care.  Genesis II is focused on the user and making grids usable.

The Specs:

  • Resource Naming Service (RNS) –  maps human-readable name to web service endpoints.  Supports Add, Remove, List.
  • ByteIO – allows you to treat grid resources like a POSIX-like file resource.
  • Basic Execution Service  (BES) – interface for starting, managing and stopping computing jobs.
  • WS-Naming – Endpoint Identifiers, Enpoint Resolution

You interact with the grid system in “file-like” ways.  Double click on a database query, drag a job onto a server resource, etc.

They use an FTP interface to manage resources on the grid.  On linux side, OGRSH acts as an intermediary between bash and the grid.  Users can do “ls”, “cat”, “cp” and OGRSH will redirect requests into the grid as appropriate.

Nigel Watling: Cloud Computing and the Internet Service Bus

http://biztalk.net

Building out a new data center in Chicago.  Microsoft is deploying 10,000 servers a month to support cloud computing.  Amazon expects their services operation to bypass the retail business soon.

Issues that come up:

  • How do I expose a service broadly?
  • How do I handle identity and access control
  • How do I interoperate?  Between vendors?  Between standards?

Connect their composite application through an ESB to the internal applications and then out to the cloud for distributed resources.

Roland Hedberg:  OM2

http://www.openmetadir.org

OM2 is about representing events and moving information about events from one place to another.  A publish-subscribe messaging system originally designed around IdM.  Implementations in Python, Java and PERL.

Three ontologies:  message, operation and object ontologies.  Message is the header like for mail.  Operation describes the actions (Miro ontology) which includes if-then-else as well as the usual add, modify, etc.  Objects describe the objects.

Messages are based on RDF/XML.  Includes support for Dynamic delegation Discovery System (DDDS, RFC 3401-3).

“Ontology Driven Application Development.”

Example applications:

Eduroam (http://www.eduroam.org) : allows you to travel between universities throughout Europe and use your local credentials to authenticate to the wireless network.

Bologna Process: supporting the movement of students between universities.  Any student should be able to go another university and take a class then come back.  Has admissions control and grade reporting.

What OM2 does:  Transport the information to the correct address at all time by the use of DDDS, by the transport protocol of the receivers choice.

Brian Busby:  ESB at UW-Madison

Talk about our use of the ESB and experience with SOA.

UW-System has been looking at SOA for years (4 or 5 years).  We got to where we were going to buy a commercial SOA suite but we passed on the purchase.  SOA went into hibernation.  Then two projects came along:

  • Course Roster Information Service
  • Course Guide

We made a decision to take advantage of a license for the Cape Clear ESB.  We can take advantage of this.

Interesting impact:  people suddenly had to change their discussion to be around services that they need not big data loads or APIs and they made the change.

Issues:

  • Right-sizing the environment – we don’t know how many people are going to be using the ESB or the load on the services.
  • ESB as a service hosting facility
  • Collaborate development teams (Integration Competency Centers)
  • What aspects of integration should the ESB handle – do you put all the business logic in the ESB, etc
  • Support of the loosely coupled environment

Organization Issues:

  • Governance
  • Ownership of the services, orchestration, operational data stores
  • Security policies
  • Web services granularity
  • Data representation – what XML should we use to represent data
  • Service Level Agreements
  • Service definition & re-use

The fact that we got the ESB in place is driving the conversations that we were having years ago forward finally.

Technorati Tags: , , , ,