John Michelsen Building A Center Of Excellence

604 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
604
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
27
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

John Michelsen Building A Center Of Excellence

  1. 1. 24-10-2008 1 Founding Sponsors This Presentation Courtesy of the International SOA Symposium October 7-8, 2008 Amsterdam Arena www.soasymposium.com info@soasymposium.com Gold Sponsors Platinum Sponsors Silver Sponsors W W W . I T K O . C O M2 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M2 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL SOA Quality COE Best Practices John Michelsen Founder, Chief Geek Oct 7, 2008
  2. 2. 24-10-2008 2 W W W . I T K O . C O M3 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL iTKO: Our Mission  Shorter Time To Market  Reduced Failure Rate  Faster Time To Recovery  Lower Maintenance Cost Our technologies and thought leadership methodology deliver: Increasing rate of change in applications & workflows IncreasingDependenciesintheITenvironment High Dependency High Change Low Dependency Low Change Client/server apps Mainframe / Packaged SOA & Composite Apps Web applications Reduce Risk for Composite Applications W W W . I T K O . C O M4 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL iTKO: Our Ecosystem Everyone should own quality™. Customers Delivery PartnersTechnology Partners TestCenter Awards
  3. 3. 24-10-2008 3 W W W . I T K O . C O M5 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Specific Issues that Need to be Resolved  Dependency on Constrained Systems: Access and capacity constraints on key systems greatly reduces agility  Inadequate Testing: Traditional testing techniques cannot automate testing against component and middleware-based workflows  Unintended Consequences: Individual components and technologies are changing at their own pace and can create severe issues within business processes W W W . I T K O . C O M6 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Complete Testing • Every heterogeneous layer of architecture • Invoke and verify • Test entire process flow Continuous Validation • Continuous Integration to Prod • Cross team requirements / policy validation Collaborative Infrastructure • Tighten coupling of team’s quality efforts • Virtualization of dependent systems to remove bottlenecks Complete single component  all technologies Continuous Phased tests  constant testing Collaborative Dev/QA test silos  everyone tests, every phase Best Practices for SOA Quality
  4. 4. 24-10-2008 4 W W W . I T K O . C O M7 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2007, iTKO, Inc. | All rights reserved. Presentation Layer Service/Process Layer Integration Layer Data/ Applications web UI Swing UI web 2.0 UI CORBA J2EEWeb ServiceBPM ESB Java Web Service RMI CustomBatch Feeds LegacyCustom AppsDatabaseFile System Packaged Apps Complete Testing to Increase Coverage W W W . I T K O . C O M8 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2007, iTKO, Inc. | All rights reserved. Complete provides Visibility Business Process Orchestration Implementation Technology Order Acquisition Check Inv Check Credit Place Order Place Order Service 1 Service 3 Service 2 Service 3
  5. 5. 24-10-2008 5 W W W . I T K O . C O M9 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2008, iTKO ( Interactive TKO, Inc.) | PROPRIETARY / CONFIDENTIAL. Invoke BP Model, verify outcomes W W W . I T K O . C O M10 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Order Entry Back Office Processing CORBA App ESB Legacy App A Business Process App B Other Now & Future Components Database Database App Server Complete Example Order Entry Swing UI Web 2.0 UI Web App EDI SOAP/XML XI JDBC
  6. 6. 24-10-2008 6 W W W . I T K O . C O M11 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL SAP Services APP 1 APP 2 Internal Services Data TransactionsMDMRegistry Legacy App SOA Platform A data service is currently failing due to a change in the internal service Continuous Validation Continuous Validation Solves for Unintended Consequences W W W . I T K O . C O M12 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2007, iTKO, Inc. | All rights reserved. Production Staging ContinuousSOATestPlatform Test Bed Dev Build Test Bed Dev Build Product ComponentProduct Component Continuous Validation Lifecycle Runtime/Promotion Change/Deploy Design/Build
  7. 7. 24-10-2008 7 W W W . I T K O . C O M13 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL LISA Test Server Continuous Example ISS LE EDU Public Affinity EPP Partner H T M L X M L Admin / Catalog Maint J W S DBProduction Metrics and Alerts Every 5 minutes complete validation of key customer scenarios are performed from 7 locations globally. Even sub-component interactions are confirmed, like order queuing to customer service and order placement Customer Invoicing S A P W W W . I T K O . C O M14 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2008, iTKO, Inc. | All rights reserved. Collaborative Infrastructure Clears Dependencies Agile teams need tighter coupling within Yet they need looser coupling from dependencies Dependencies in the deployed system manifest as significant team-to-team constraint issues. Introducing Service Oriented Virtualization
  8. 8. 24-10-2008 8 W W W . I T K O . C O M15 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Current Environment UDDI registry SOAP request ERP Database Mainframe Source Application JDBC CICS Legacy W W W . I T K O . C O M16 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL W W W . I T K O . C O M© 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Virtual Service Environment (VSE) Remove Constraints with SOV UDDI registry Source Application JDBC CICS VS1’ DB1’ MF1’ SOAP request ERP Database Mainframe Legacy
  9. 9. 24-10-2008 9 W W W . I T K O . C O M17 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Supplier LISA VSE Buyer SAP R/3 Integration Layer SAP XI Search Catalog Create Purchase Order Confirm receipt of Purchase Order Verify & approve invoice Transform iDOC XML to supplier XML Max DB iDOC Adaptor Asynchronous Web Service Call Receive PO Create Shopping Cart Approve Shopping Cart Transform supplier XML to iDOC XMLiDOC Adaptor Send PO Confirmation Create & Validate Sales Order Transform supplier XML to iDOC XMLiDOC Adaptor Send Invoice Asynchronous Web Service Call Asynchronous Web Service Call Respond in both functional and load conditions Procure to Pay (P2P) Process: Simulating Supplier Send Delivery Goods Received Asynchronous Web Service Call Transform supplier XML to iDOC XMLiDOC Adaptor W W W . I T K O . C O M18 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL iTKO: Our Solution - LISA Testing • Complete • Collaborative • Extensible • Complements HP Validation • Continuous • Functional Monitoring • Policy Validation • Proactive Alerting Virtualization • Constraint Simulations • Eliminates Dependencies • Complete Environment • Supports Load • Pass thru mode
  10. 10. 24-10-2008 10 W W W . I T K O . C O M19 © 2008, Interactive TKO, Inc. | PROPRIETARY / CONFIDENTIAL Summary • For more info on LISA’s SOA Testing, Validation & Virtualization capabilities and metholodogy: • URL: http://www.itko.com • Request an evaluation: sales@itko.com • iTKO Blog: http://blog.itko.com • Email: info@itko.com

×