• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
SwiftKnowledge Multitenancy
 

SwiftKnowledge Multitenancy

on

  • 1,708 views

Multi-Tenancy Approaches with Business Intelligence Solution

Multi-Tenancy Approaches with Business Intelligence Solution

Statistics

Views

Total Views
1,708
Views on SlideShare
1,688
Embed Views
20

Actions

Likes
0
Downloads
60
Comments
0

4 Embeds 20

http://www.pivotlogix.com 7
http://www.linkedin.com 7
http://www.slideshare.net 4
http://www.alliegentry.com 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    SwiftKnowledge Multitenancy SwiftKnowledge Multitenancy Presentation Transcript

    • WEBINAR Multi-Tenant Business Intelligence in a Cloud Computing Environment Allie Gentry, Chief Technology Officer Scott deVillers, Solution Architect February 18, 2010
    • Business Intelligence Trends  For enterprises  Increased BI adoption among business managers  Driven by improved usability and ease of use of ad-hoc query and reporting capabilities  For ISVs and SaaS vendor applications  BI is becoming an embedded component of ISV and SaaS vendor applications  ISVs and SaaS vendors need to deliver BI in context to the applications and the business  For information aggregators  Enterprises and information aggregators can productize valuable data through packaging it with web-based BI Broad-based adoption of BI requires integrating data from multiple sources, both inside and outside the corporate firewall.
    • What is Multi-Tenancy?  Definition  A single instance of software runs on a server, serving multiple client organizations (tenants)  How it works  With a multi-tenant architecture, a software application is designed to virtually partition its data and configuration, so each client organization works with a customized virtual application instance  Critical considerations for multi-tenancy  Scalability  Security  Re-branding  Localization  Support for cloud computing-based deployments
    • Use Cases for Multi-Tenant BI  ISVs who want to offer hosted or SaaS solutions  Pure-play SaaS vendors  Enterprises deploying a solution globally across different groups/regions  Information aggregators seeking to offer access to data via web-based BI tools
    • Today’s Agenda  The benefits of a multi-tenant approach to BI implementations in a cloud computing environment  How to add capacity as you add clients  How to easily overcome the data security concerns and challenges often associated with a multi-tenant approach  The characteristics and benefits behind the four main approaches to multi-tenant BI in a cloud computing environment, and which one is right for you
    • Benefits of Multi-Tenant BI  Increased efficiencies and cost savings  Leveraging a single installation of the BI application to support multiple clients provides for a lower cost of acquisition and ownership  Operational efficiencies allow rapid onboarding of new clients, time to productivity and revenue  Provides lower user license expenses  Simplified user and release management  Zero-footprint, web-based solutions require zero management at the client level  No client-based license keys  Simplified release management processes  Increased responsiveness  To both market changes and customer needs  Easy re-branding  Provides a personalized end user experience
    • Architecture – Technical Details Interface Layer jQuery Ext JS HTML/CSS (Client Side) Client Browser Layer Presentation Admin UI Reporting UI Layer Portal Login Menus Admin SwiftView Grid Chart Meters Maps (Server Side) Administration Base Shared Components Reporting Base Business Admin Logic Reporting Logic Layer Web Portal Login Menus Admin SwiftView Filtering Calculations Security Variables Application Layer Administration Base Shared Components OLAP Rprt. Base Relation Rprt. Base Security Layer App Data Data Layer SwiftKnowledge OLAP Relational Application Layer Database Layer Database Layer Users Groups Metadata Cache Data Access Data Custom Roles View Metadata Access Logic Data Access Logic Mining Data Layer API Client Detail Query Data Access Data Analysis Data Access Logic Layer Data Sources ADO.NET/LINQ ADOMD/ADOMD.NET ADO.NET ADO.NET ADO.NET ADO.NET SQL SQL SQL Oracle MySQL Custom Database
    • Multi-Tenancy – Four Approaches SWIFTKNOWLEDGE SUPPORTS EVERY DELIVERY OPTION Client Data Layer 1 Many 1 2 1 Web Application Layer 3 4 Many
    • Tenancy Approach 1 | 1 : 1  Isolation at the data layer is logical and managed with SwiftKnowledge Component-Level Security  Uniform brand identity across clients  Application and data management can be delegated to client  Granularity of data security to specific clients and users  Data volume growth requirements are a factor of all tenants
    • Tenancy Approach 1 Steps to Onboard a New Client STEP 1: Load new client data into existing database STEP 2: Import users for new client  Source can be ADS, LDAP or custom third-party authentication  Users and groups are created on-the-fly STEP 3: Define security at data layer for new client/users
    • Tenancy Approach 2 | 1 : Many  Uniform brand identity across clients  Granularity of data security to specific clients and users  Data volume and growth requirements handled independently
    • Tenancy Approach 2 Steps to Onboard a New Client STEP 1: Instantiate new hardware and populate database STEP 2: Import users for new client  Source can be ADS, LDAP or custom third-party authentication  Users and groups are created on-the-fly STEP 3: Define security at data layer for new client/users
    • Tenancy Approach 3 | Many : 1  Isolation at the data layer is logical and managed with SwiftKnowledge Component-Level Security  Unique branding and globalization  Application and data management can be delegated to client  Granularity of data security to specific clients and users  Data volume growth requirements are a factor of all tenants
    • Tenancy Approach 3 Steps to Onboard a New Client STEP 1: Load new client data into existing database STEP 2: Create new virtual directory for new client STEP 3: Import users for new client  Source can be ADS, LDAP or custom third-party authentication  Users and groups are created on-the-fly STEP 4: Define security at data layer for new client/users
    • Tenancy Approach 4 | Many : Many  Isolation is physical for all layers  Granularity of data security to specific clients and users  Flexibility to manage growth and administration  Branding and globalization unique  Client data volumes and growth handled independently Ideal for clients who require physical segregation of data; flexible growth path
    • Tenancy Approach 4 Steps to Onboard a New Client STEP 1: Instantiate new hardware STEP 2: Populate database with client-specific data STEP 3: Instantiate new web server STEP 4: Create new virtual directory for new client STEP 5: Import users for new client  Source can be ADS, LDAP or custom third-party authentication  Users and groups are created on-the-fly STEP 6: Define security at data layer for new client/users
    • Steps for Client Onboarding Approach 1 2 3 4 Web Application Layer 1/1 1 / Many Many / 1 Many / Many Instantiate new web server* Configure client-specific virtual directory Create application database Import users for new client Define security at data layer for new clients Secure application functionality, including administration Client Data Layer Instantiate new database server** Populate database with client-specific data Load new client data into existing database * This can mean adding a virtual directory to an existing web server ** This can mean adding a new database to an existing database server
    • The Benefits of Each Approach Approach 1 2 3 4 Web App Layer/Data Layer 1/1 1 / Many Many / 1 Many / Many Granularity of data security to specific clients and users Branding Globalization Client data volumes and growth handled independently Application/data management can be delegated to client Efficient cross-client comparisons
    • Considering a Multi-Tenancy Solution?  Ask yourself  What is my business strategy, and is it limited by my current technologies?  The technology needs to support – not drive – the business strategy  Ask potential solution providers  Does the solution support both cloud computing deployments and appliance installations?  Who will host the data? Are they certified for data security?  Reference sites  Microsoft  http://msdn.microsoft.com/en-us/library/aa479086.aspx#mlttntda_topic2  Wikipedia  http://en.wikipedia.org/wiki/Multitenancy  http://en.wikipedia.org/wiki/Multitenancy#Competitive_Differentiation
    • Unique Combination of Innovations For ISVs and SaaS  Built specifically for ISVs and their end users  Uniquely satisfying Interactive Component- Data Level end user experience Streaming™ Security™  Ultra-fast BI performance in “Web time” Breakthrough User  Linear scalability means Experience lower data center costs  Flexible security and multi-tenancy  No plug-ins, client Zero-Footprint downloads, license keys Web Deployment  Completely re-brandable  Flexible licensing to fit any profit model
    • What would you like to do next? View recorded webinar Visit www.swiftknowledge.com Allie Gentry – argentry@swiftknowledge.com Scott deVillers – scott.devillers@swiftknowledge.com