Doug Ouzts Partner Management

637 views
479 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
637
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Doug Ouzts Partner Management

  1. 1. Doug Ouzts Partner Management & Training Condrey Corporation [email_address] Empowering User Collaboration
  2. 2. Agenda <ul><li>Background and the Challenges </li></ul><ul><li>Current Workarounds </li></ul><ul><li>The Doc X changer Paradigm </li></ul><ul><li>Empowering User Collaboration </li></ul><ul><li>Solution Components </li></ul><ul><li>Installation and Deployment </li></ul><ul><li>Demo / Q&A </li></ul>
  3. 3. <ul><li>Software development company focusing exclusively on directory-enabled & policy-based storage management </li></ul><ul><li>U.S. Corporation based in Greenville, South Carolina. </li></ul><ul><li>Customers in 33 countries representing General Commercial, Fortune 1000, Government, Military, Higher-Ed, K-12, and Healthcare. </li></ul><ul><li>Novell Engineering Partner … Novell Storage Manager™ </li></ul><ul><li>Microsoft Empowered Development Partner </li></ul><ul><li>Leader in Identity-driven & Policy-based Storage </li></ul><ul><li>Enterprise level customers </li></ul><ul><li>Partner Driven (NSM, Kanaka for Mac, IUAdmin, DocXchanger) </li></ul>Condrey Corporation
  4. 4. Background and Collaboration Challenges
  5. 5. The Landscape <ul><li>85% of data existing on networks in the world today is unstructured. (and most of that is on traditional file servers) </li></ul><ul><li>Users need help managing unstructured data. </li></ul><ul><li>Document management has a bad reputation (big and unwieldy). </li></ul><ul><li>Every organization and every user performs document management tasks every day. (whether they want to or not) </li></ul>
  6. 6. Baseline Storage Management Personal Storage Collaborative Storage English Dept Yearbook Administrator manually creates, moves and cleans up collaborative and personal storage
  7. 7. Personal Storage Collaborative Storage English Dept Yearbook Novell Storage Manager Novell Storage Manager Administrator installs Novell Storage Manager to automate collaborative, class and personal storage based on policies Automated Storage Management Novell Storage Manager
  8. 8. Collaboration Challenges Personal Storage Collaborative Storage English Dept Yearbook Cathy Bill Tom
  9. 9. Properties of Dynamic Collaboration <ul><li>Intended sharing duration is variable. </li></ul><ul><li>Only a few documents may need to be shared (scope is likely limited). </li></ul><ul><li>Access rights need to be flexible and driven by the user. </li></ul><ul><li>Delays are not an option. </li></ul><ul><li>In the end, only the user knows their collaboration needs at any point in time. </li></ul>
  10. 10. Collaboration Challenges <ul><li>Ad hoc collaboration with other users on the network is hard for users. </li></ul><ul><li>Collaborating with people outside of the organization is very hard for users. </li></ul><ul><li>The network admin has to be involved to enable any type of new collaboration. </li></ul><ul><li>Sometimes users just need to publish information… other times they need people to be able to perform updates. </li></ul><ul><li>Delays are not an option </li></ul><ul><li>Universal problem…but there are workarounds. </li></ul>
  11. 11. Current Workarounds
  12. 12. #1 Email Attachments
  13. 13. #1 Email Attachments
  14. 14. #2 Have the Admin Help <ul><li>Have the Network Admin: </li></ul><ul><li>Set up a group </li></ul><ul><li>Create storage space on the network. </li></ul><ul><li>Give rights as appropriate </li></ul><ul><li>Create accounts for external users. </li></ul><ul><li>Get everything cleaned up when you are done. </li></ul>
  15. 15. #3 Find a Place on the Web <ul><li>Find a place on an external website …probably outside the organization. </li></ul><ul><li>Remember to Upload/Download stuff after you work on it. </li></ul><ul><li>Hope that the security officer or your boss doesn’t mind. </li></ul>
  16. 16. The Doc X changer Paradigm
  17. 17. Basic Premise Set <ul><li>There is a need to overcome the previous mentioned challenges </li></ul><ul><li>People want less hassle. </li></ul><ul><li>It is best to share things from existing working locations…no movement of files. </li></ul><ul><li>Nobody wants to change how they do things…Evolution vs Revolution </li></ul>
  18. 18. The Solution lies in the Network <ul><li>The organizational network already exists. </li></ul><ul><li>It is funded and managed. </li></ul><ul><li>The data is already there. </li></ul><ul><li>The users are already there. </li></ul>Bottom Line! There is no need to fund and build a new infrastructure and migrate data . The solution is to empower the users on the network.
  19. 19. Solution: Doc X changer <ul><li>Empowers end-users to easily share existing network files and folders with colleagues both inside and outside the organization. </li></ul><ul><li>Governed by security defined by the administrator. </li></ul><ul><li>Eliminates file sharing via e-mail attachments </li></ul><ul><li>Empowers teams to create their own collaborative storage space </li></ul><ul><li>Both web and OS-integrated clients give flexibility and choice. </li></ul><ul><li>Leverages existing eDirectory and storage infrastructure </li></ul>
  20. 20. Defining the Players Administrator Provider Internal Consumers External Consumers Defines policies governing what files and folders can be shared (internally and externally) Internal faculty, staff or students that need to provide files or folders for sharing. Internal faculty, staff or students that need to share and access files or folders. Colleagues at other school districts, colleges, parents, board members, etc that need access to the shared files or folders.
  21. 21. Empowered Users Collaborating Provider Home Directory Shared Storage Administrator Identity Information, Authentication and Data Store NCP AFP CIFS X eDirectory
  22. 22. Empowered Users Collaborating X Provider Administrator The administrator defines global rules & policies governing file & folder sharing for internal and external consumers Home Directory Shared Storage NCP AFP CIFS eDirectory
  23. 23. Empowered Users Collaborating Provider Administrator The provider selects files or folders to be shared based on defined policies Home Directory Shared Storage NCP AFP CIFS X eDirectory
  24. 24. Empowered Users Collaborating Provider Administrator An e-mail is sent to each consumer containing a ticket and file link Corporate Mail Server Internal Consumer External Consumer Home Directory Shared Storage NCP AFP CIFS E-Mail DXV X eDirectory
  25. 25. Empowered Users Collaborating HTTPS Provider Administrator Internal consumers have direct access or ticket based access via a web browser Home Directory Shared Storage NCP AFP CIFS NCP AFP CIFS Internal Consumer X eDirectory
  26. 26. Empowered Users Collaborating Internal Consumer External Consumer Provider Administrator External consumers have ticket based access via a web browser HTTPS Home Directory Shared Storage NCP AFP CIFS NCP AFP CIFS X eDirectory
  27. 27. Security Life as an Administrator
  28. 28. Mental Security Check <ul><li>In my environment, is there anything to stop someone from copying data from a server to a laptop or USB drive, taking it home, and then distributing the data over the Internet? </li></ul><ul><li>Can users on my network send e-mail attachments today? </li></ul><ul><li>Can I do anything to stop them? </li></ul><ul><li>When they send e-mail attachments, can I stop the recipient from forwarding them on to any person they choose? </li></ul>Before we proceed, ask yourself these questions and then, as we go through the rest of the presentation, continue to consider your answers. Conclusion: In almost all environments, when someone is given rights to data, they are being trusted with it’s safekeeping based on common sense and ethics. Any other conclusion is just kidding yourself.
  29. 29. Administrator <ul><li>Defines the limits and the characteristics under which Doc X changer operates using a browser-based Administrative interface. </li></ul><ul><li>Defines rules for files & folders allowed for internal sharing </li></ul><ul><li>Defines exclusion rules for critical data </li></ul><ul><li>Defines policy governing external collaboration </li></ul>
  30. 30. Admin Interface - Security Control who may be Consumers. Enable/Disable external Consumers. Defined rights. Define what may and may not be shared through the system. Describe rights needed to create sharing links.
  31. 31. Life as a Provider
  32. 32. Provider <ul><li>Selects files and/or folders to share and who to share them with. </li></ul><ul><li>Has a choice of interfaces: </li></ul><ul><ul><li>Native Platform OS Integrated Provider Client (for direct access) </li></ul></ul><ul><ul><li>Web Browser Provider Interface (may be used from local or remote locations) </li></ul></ul>
  33. 33. Provider: Native Platform Interface <ul><li>Integrates with the OS. </li></ul><ul><li>Behaves in a manner native to the platform and it’s users. </li></ul><ul><li>Windows XP and Vista ready now. </li></ul><ul><li>Linux desktop and Apple® Mac OS X are scheduled to be released in the very near future. </li></ul>
  34. 34. Windows Provider Client
  35. 35. Windows Provider Client
  36. 36. Provider: Optional Web Interface <ul><li>User authenticates contextlessly and is shown a list of storage resources based on his identity. </li></ul><ul><li>User browses through the file system to the desired file or folder and clicks the Share link. </li></ul>
  37. 37. Provider: Optional Web Interface
  38. 38. Life as an Internal Consumer
  39. 39. Internal Consumer <ul><li>A user in the same organization and network as the Provider. </li></ul><ul><li>Uses files and/or folders shared by a Provider. </li></ul><ul><li>Has a choice of interfaces: </li></ul><ul><ul><li>Native Platform OS Integrated Application (for direct access) </li></ul></ul><ul><ul><li>Web Browser Consumer Interface (may be used from local or remote locations) </li></ul></ul><ul><ul><li>A thin remote client Explorer-like application that supports drag and drop of files and folders over an HTTPS connection. (near future) </li></ul></ul>
  40. 40. Internal Consumer Notification <ul><li>Each consumer receives notification of a new sharing link via e-mail from the Doc X changer server. </li></ul><ul><li>Most any mail client is supported. </li></ul><ul><li>The message contains: </li></ul><ul><ul><li>Information from the Provider about the data. </li></ul></ul><ul><ul><li>A ticket-based URL for remotely accessing the storage via a browser </li></ul></ul><ul><ul><li>A small XML file attachment (.DXV file) for accessing the shared storage directly. </li></ul></ul><ul><ul><li>Legal or other formatting information derived from a system-defined e-mail template. </li></ul></ul>
  41. 41. Direct Access
  42. 42. Direct Access Windows Name Space Extension <ul><li>Integrates with Windows Explorer </li></ul><ul><li>Retains DXV linkage information for the life of the ticket so that the user does not have to go back to the notification mail message repeatedly. </li></ul><ul><li>Provides direct access into the storage. </li></ul><ul><li>Integrates with Application Open and Save As dialogs for a seamless user experience. </li></ul>
  43. 43. .DXV Files <ul><li>DXV ( D oc X changer V ector) files are small XML files that describe the ticket associated with the shared link. </li></ul><ul><li>The client application registers with the OS so that when the user clicks on the attachment, the XML file is used to have the client directly open the shared storage. </li></ul><ul><li>Each DXV file includes path information relative to various storage access protocols. </li></ul><ul><li>This allows a notification email to be used by any email client on any platform without regard for file system access protocol. </li></ul>
  44. 44. Remote Web Access
  45. 45. Remote Web Access
  46. 46. Write Access
  47. 47. Life as an External Consumer
  48. 48. External Consumer <ul><li>A user outside of the organization and network of the Provider. </li></ul><ul><li>Uses files and/or folders shared by a Provider. </li></ul><ul><li>Uses a Web Browser-base Consumer interface for accessing the storage. </li></ul>
  49. 49. External Consumer Notification <ul><li>Each consumer receives notification of a new sharing link via e-mail from the Doc X changer server. </li></ul><ul><li>Most any mail server and client are supported. </li></ul><ul><li>The message contains: </li></ul><ul><ul><li>Information from the Provider about the data. </li></ul></ul><ul><ul><li>A ticket-based URL for remotely accessing the storage via a browser </li></ul></ul><ul><ul><li>Legal or other formatting information derived from a system-defined e-mail template specialized for external consumers. </li></ul></ul>
  50. 50. Remote Web Access
  51. 51. Remote Web Access
  52. 52. Remote Web Access
  53. 53. Write Access
  54. 54. Installation and Deployment
  55. 55. Provider Architecture RIA Interface (internal) Corporate Mail Server Internal Consumer External Consumer Mail Template HTTPS XML/HTTPS Provider Web Interface (external) X eDirectory
  56. 56. Overall System Architecture Provider Internal Consumer External Consumer RIA Interface (internal) X -Server Provider HTTPS Interface SMTP Client SubSys Ticketing Subsys Timed ACL SubSys Consumer HTTPS Interface Identity Information & Authentication Web Interface (external) eDirectory
  57. 57. Integration with eDirectory <ul><li>Doc X changer Tickets are stored in eDirectory as objects in a designated Ticket Container. </li></ul><ul><li>The system is self-maintaining. </li></ul><ul><li>Schema extensions are required to create attributes and definitions for 3 classes: </li></ul><ul><ul><li>Ticket Container </li></ul></ul><ul><ul><li>Ticket </li></ul></ul><ul><ul><li>Server Proxy </li></ul></ul>
  58. 58. Traditional Installation <ul><li>Install on any server in the Tree </li></ul>Production Tree (Clustered) X X
  59. 59. Cross-Tree Installation <ul><li>Install on a server in a utility tree </li></ul>Production Tree X
  60. 60. Soft Appliance Deployment <ul><li>Delivered as a set of clustered VMs (future) </li></ul>Production Tree VM VM X
  61. 61. Hard Appliance Deployment <ul><li>Clustered VMs on dedicated hardware (future). </li></ul>Production Tree VM VM X
  62. 62. Q & A Empowering User Collaboration HTTP://WWW.CONDREYCORP.COM
  63. 63. Kanaka for MAC OSX Condrey Corporation Identity-Driven Storage Access
  64. 64. Kanaka for MAC OS X – Condrey Corporation Identity-Driven Storage Access for Mac OS X <ul><li>eDirectory Plug in for Mac OS X </li></ul><ul><li>Developed with Apple Engineering </li></ul><ul><li>Authentication & Single Sign on to MAC OS X </li></ul><ul><li>and Novell Network </li></ul><ul><li>Automatically mount users home directory </li></ul><ul><li>based on Identity </li></ul><ul><li>Automatically mount collaborative storage </li></ul><ul><li>based on Identity </li></ul><ul><li>End User Storage Dashboard and Password </li></ul><ul><li>Change functionality </li></ul>http://www.condreycorp.com
  65. 65. Kanaka for MAC OS X Identity-Driven Storage Access for Mac OS X eDirectory
  66. 66. Kanaka for MAC OSX Student View – Home Directory
  67. 67. Kanaka for MAC OSX Student View – English Class
  68. 68. Kanaka for MAC OSX Teacher View – English Class Folders
  69. 69. Condrey Corporation 125 The Parkway, STE 500 Greenville, SC 29615 USA Tel 864-329-8528 www.condreycorp.com Document Version 0.7. Copyright © 2007 Condrey Corporation. All Rights Reserved. Condrey Corporation, the Condrey Corporation “C’s” logo, DocXchanger, and File System Factory are trademarks of Condrey Corporation in the United States and other jurisdictions. Novell and NetWare are registered trademarks of Novell, Inc. Microsoft and Microsoft Windows are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Apple, Macintosh, and Mac OS X are registered trademarks of Apple Computer, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.  

×