Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

View Presentation - Volpe Center | Innovation in Multimodal ...


Published on

  • Be the first to comment

  • Be the first to like this

View Presentation - Volpe Center | Innovation in Multimodal ...

  1. 1. IT Modernization with Oracle Thanikai Sokka Senior Sales Consultant Oracle Fusion Middleware
  2. 2. Agenda <ul><li>Common Business Drivers & Challenges </li></ul><ul><li>Industry Solutions </li></ul><ul><li>What is SOA? </li></ul><ul><li>What is Enterprise Security? </li></ul><ul><li>What is Grid Computing? </li></ul><ul><li>Realizing SOA, Enterprise Security, and Grid Computing with Oracle </li></ul><ul><li>Q&A </li></ul>
  3. 3. Business Drivers & Challenges <ul><li>While trying to: </li></ul><ul><ul><li>Leverage existing systems and assets </li></ul></ul><ul><ul><li>Integrate stove piped applications </li></ul></ul><ul><ul><li>Deal with heterogeneous environments (Interoperate) </li></ul></ul><ul><ul><li>Meet performance, scale, and high availability requirements </li></ul></ul><ul><ul><li>Consistently implement security and other infrastructure services </li></ul></ul><ul><li>How do we: </li></ul><ul><ul><li>Enable IT to efficiently implement new initiatives </li></ul></ul><ul><ul><li>Lower development and maintenance costs </li></ul></ul><ul><ul><li>Meet compliance regulations (HSPD-12) </li></ul></ul><ul><ul><li>Gain better visibility and insight </li></ul></ul><ul><ul><li>Automate and streamline processes </li></ul></ul><ul><ul><li>Share information </li></ul></ul><ul><ul><li>Closer align business and IT </li></ul></ul>Challenges Business Drivers
  4. 4. Industry Solutions to Consider <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
  5. 5. <Insert Picture Here> What is SOA?
  6. 6. IT Challenge Stove-Piped, Monolithic Applications Channels Presentation rendering Business processes Data Integration & transformation Data schemas Business rules & logic Application n     Application 1     Application 2     Application 3     Inflexible, Inefficient, Hard to Maintain <ul><li>Hard to adapt to changing business requirements </li></ul><ul><li>Duplication of functionality means wasted resources </li></ul><ul><li>Small fixes require large investments of time and labor </li></ul><ul><li>Integration represents 80% of IT Budget </li></ul>
  7. 7. Heterogeneous Environment DCPDS BAM Batch Processing Data Aggregation/Synch Database Warehouse Mainframe Portal Wireless / Mobile 3 rd Party
  8. 8. IT Solution: Service Oriented Architecture Build Applications Effectively PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating SOA Application Stove Piping Flexible Architecture <ul><li>Two basic concepts: </li></ul><ul><li>Services : also known as components, business functions, or “web services” </li></ul><ul><ul><li>Examples: </li></ul></ul><ul><ul><li>Create Invoice </li></ul></ul><ul><ul><li>Delete Account </li></ul></ul><ul><li>Orchestration : the combining of services into business processes </li></ul><ul><ul><li>Advantages: </li></ul></ul><ul><ul><li>Build and integrate quickly - without software coding/development </li></ul></ul><ul><ul><li>Handle errors easily and elegantly </li></ul></ul>               
  9. 9. SOA Today Leverages Open Standards Rooted from XML ERP/ Legacy Apps Custom Apps & Services Web services WSDL/WSIF XML/XML Schema SOAP JCA JMS BUSINESS SERVICES More Interoperable Process Flow Logic XSLT/XQuery BPEL More Adaptable PROCESS ORCHESTRATION PORTAL JSR-168 USER INTERFACE Struts/JSF Portal Web Application API WS Richer Experience PKI Dashboards BAM MONITORING JMX Fusion Effect WS-Security SERVICE BUS Security Reliability Logging Failover Dynamic Routing WS-Policy, SAML Web Services Mgmt
  10. 10. SOA Enabled System Environment <ul><li>Simplified and common: </li></ul><ul><ul><li>Integration / Automation </li></ul></ul><ul><ul><li>Administration </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><li>Total visibility </li></ul><ul><li>Enable runtime changes </li></ul><ul><li>Standards-based plug&play </li></ul><ul><ul><li>Web Services & “SOA” </li></ul></ul>Middleware BAM Batch Processing Data Aggregation/Synch Database Warehouse Mainframe Portal Wireless / Mobile DCPDS 3 rd Party Web services
  11. 11. Promise of SOA <ul><li>Greater enterprise flexibility and agility </li></ul><ul><li>Automate end-to-end processes </li></ul><ul><li>Share and integrate while maintaining ownership control </li></ul><ul><li>Improved visibility </li></ul><ul><li>Increase IT efficiency </li></ul><ul><ul><li>Greater interoperability </li></ul></ul><ul><ul><li>Increase reuse and leverage existing system assets </li></ul></ul><ul><ul><li>Enable graceful migration from legacy systems </li></ul></ul><ul><li>Reduce integration, maintenance, and operational cost </li></ul><ul><li>Smaller business IT gap </li></ul>
  12. 12. <Insert Picture Here> What is Enterprise Security?
  13. 13. <ul><li>Q: How do you control access to your sensitive applications? </li></ul><ul><li>a – Usernames and passwords </li></ul><ul><li>b – Contextual authentication </li></ul><ul><li>c – Hardware token </li></ul>
  14. 14. <ul><li>Q: What determines your employee’s access? </li></ul><ul><li>a – Give Alice whatever Wally has </li></ul><ul><li>b – Base on her business roles </li></ul><ul><li>c – Whatever her manager says </li></ul>
  15. 15. <ul><li>Q: Who is the most privileged user in your enterprise? </li></ul><ul><li>a – Security administrator </li></ul><ul><li>b – CFO </li></ul><ul><li>c – The 3-peat summer intern who is now working for your competitor </li></ul>
  16. 16. <ul><li>Q: How secure is your identity data? </li></ul><ul><li>a – It is in 18 different secured stores </li></ul><ul><li>b – We protect the admin passwords </li></ul><ul><li>c – Privacy? We don’t hold credit card numbers </li></ul>
  17. 17. <ul><li>Q: How much are manual compliance controls costing your organization? </li></ul><ul><li>a – Nothing, no new headcount </li></ul><ul><li>b – Don’t ask </li></ul><ul><li>c – Don’t know </li></ul>
  18. 18. Today’s IT Challenges <ul><li>More Agile Business </li></ul><ul><li>More accessibility for employees, customers and partners </li></ul><ul><li>Higher level of B2B integrations </li></ul><ul><li>Faster reaction to changing requirements </li></ul><ul><li>More Secured Business </li></ul><ul><li>Organized crime </li></ul><ul><li>Identity theft </li></ul><ul><li>Intellectual property theft </li></ul><ul><li>Constant global threats </li></ul><ul><li>More Compliant Business </li></ul><ul><li>Increasing regulatory demands </li></ul><ul><li>Increasing privacy concerns </li></ul><ul><li>Business viability concerns </li></ul>
  19. 19. State Of Security In Enterprise <ul><li>Incomplete </li></ul><ul><ul><li>Multiple point solutions from many vendors </li></ul></ul><ul><ul><li>Disparate technologies that don’t work together </li></ul></ul><ul><li>Complex </li></ul><ul><ul><li>Repeated point-to-point integrations </li></ul></ul><ul><ul><li>Mostly manual operations </li></ul></ul><ul><li>‘ Non-compliant’ </li></ul><ul><ul><li>Difficult to enforce consistent set of policies </li></ul></ul><ul><ul><li>Difficult to measure compliance with those policies </li></ul></ul><ul><li>Business ‘un-friendly’ </li></ul><ul><ul><li>Solutions not user-centric but technology-centric </li></ul></ul><ul><ul><li>Processes not end-user friendly </li></ul></ul>
  20. 20. How can an enterprise security solution help? <ul><li>Establish Enterprise Identity & Roles </li></ul><ul><li>Enforce Strong And Granular Security Policies </li></ul><ul><li>Automate Security Related Processes </li></ul><ul><li>Compliance & Fraud Mgmt. </li></ul><ul><li>Centralized Security And Administration </li></ul><ul><li>Ensure Data Privacy </li></ul><ul><li>Flexible Risk Based Security </li></ul><ul><li>Define Audit And Control Framework </li></ul><ul><li>Security And Control For Enterprise Applications </li></ul><ul><li>Manageability and Security For Databases </li></ul><ul><li>Deploy A Scalable and Flexible Integration Architecture </li></ul>? ! X
  21. 21. Promise of an Enterprise Security Solution <ul><li>Trusted and reliable security </li></ul><ul><li>Efficient regulatory compliance </li></ul><ul><li>Lower administrative and development costs </li></ul><ul><li>Enable online business networks </li></ul><ul><li>Better end-user experience </li></ul>
  22. 22. <Insert Picture Here> What is Grid Computing?
  23. 23. Grid Vision <ul><li>Computing as a utility </li></ul><ul><ul><li>A network of clients and service providers </li></ul></ul><ul><li>Client-side: Simplicity </li></ul><ul><ul><li>Request computation or information and receive it </li></ul></ul><ul><li>Server-side: Sophistication </li></ul><ul><ul><li>Availability, load balancing, utilization </li></ul></ul><ul><ul><li>Information sharing, data management </li></ul></ul><ul><li>Virtualization </li></ul><ul><ul><li>Nothing more virtual than a utility </li></ul></ul><ul><ul><li>Massive potential </li></ul></ul>
  24. 24. Benefits of the Grid <ul><li>Better information faster </li></ul><ul><ul><li>Perform more work with fewer resources </li></ul></ul><ul><ul><li>Spread work across resources </li></ul></ul><ul><ul><li>Access to resources on demand </li></ul></ul><ul><li>Faster response to changing business priorities </li></ul><ul><ul><li>Instantly and dynamically realign IT resources as business needs change </li></ul></ul><ul><li>Reduced IT costs </li></ul><ul><ul><li>Improve utilization of existing resources </li></ul></ul><ul><ul><li>Utilize less expensive commodity platforms </li></ul></ul>
  25. 25. <Insert Picture Here> So how do we get there? How do we realize SOA, Enterprise Security, and Grid Computing?
  26. 26. Oracle - The Information Company Oracle Fusion Middleware Information Age Applications <ul><li>Oracle E-Business Suite </li></ul><ul><li>PeopleSoft Enterprise </li></ul><ul><li>JD Edwards Enterprise One </li></ul><ul><li>JD Edwards World </li></ul><ul><li>Siebel </li></ul><ul><li>Retek </li></ul><ul><li>ProfitLogic </li></ul><ul><li>G-Log </li></ul><ul><li>Application Server </li></ul><ul><li>Integration / SOA </li></ul><ul><li>Hot-Pluggable </li></ul><ul><li>Business Intelligence </li></ul><ul><li>Identity Management </li></ul><ul><li>Data Hubs </li></ul><ul><li>Collaboration Services </li></ul><ul><li>Process Orchestration </li></ul><ul><li>Java Development Tools </li></ul><ul><li>Database </li></ul><ul><li>Real Application Clusters (RAC) </li></ul><ul><li>Enterprise Manager </li></ul><ul><li>Partitioning </li></ul><ul><li>OLAP </li></ul><ul><li>Security </li></ul><ul><li>Lite </li></ul><ul><li>Times Ten </li></ul>Oracle Database 10g Grid Computing
  27. 27. Oracle Fusion Middleware <ul><li>Oracle SOA Suite </li></ul><ul><ul><li>Oracle Enterprise Service Bus (ESB) </li></ul></ul><ul><ul><li>Oracle BPEL Process Manager (BPEL PM) </li></ul></ul><ul><ul><li>Oracle Business Activity Monitor (BAM) </li></ul></ul><ul><ul><li>Oracle Web Services Manager (WSM) </li></ul></ul><ul><ul><li>Oracle Business Rules Engine </li></ul></ul><ul><ul><li>Oracle Integration Adapters </li></ul></ul><ul><ul><li>Oracle Service Registry </li></ul></ul><ul><li>Oracle BPA Suite </li></ul><ul><ul><li>IDS Scheer ARIS Business Process Architect </li></ul></ul><ul><ul><li>IDS Scheer ARIS Business Process Simulator </li></ul></ul><ul><ul><li>IDS Scheer ARIS Business Process Publisher </li></ul></ul><ul><ul><li>Oracle SOA Integration Extensions </li></ul></ul><ul><li>Oracle Web Center Suite </li></ul><ul><ul><li>Oracle Application Development Framework (ADF) </li></ul></ul><ul><ul><li>Oracle Web Center Framework </li></ul></ul><ul><ul><li>Oracle Web Center Services </li></ul></ul><ul><ul><li>Oracle Web Center Anywhere </li></ul></ul><ul><ul><li>Oracle JDevelopor </li></ul></ul><ul><li>Oracle Identity Management Suite </li></ul><ul><ul><li>Oracle Internet Directory </li></ul></ul><ul><ul><li>Oracle Virtual Directory </li></ul></ul><ul><ul><li>Oracle Identity Manager </li></ul></ul><ul><ul><li>Oracle Identity Federation </li></ul></ul><ul><ul><li>Oracle Enterprise Single Sign On </li></ul></ul><ul><ul><li>Oracle Access Manager </li></ul></ul><ul><li>Oracle Business Intelligence </li></ul><ul><ul><li>Oracle BI Standard Edition </li></ul></ul><ul><ul><li>Oracle Reports </li></ul></ul><ul><ul><li>Oracle BI Discoverer </li></ul></ul><ul><ul><li>Oracle BI Publisher </li></ul></ul><ul><li>Oracle Application Server </li></ul><ul><ul><li>Oracle Business Rules Engine </li></ul></ul><ul><ul><li>Oracle Service Registry </li></ul></ul><ul><ul><li>Oracle Sensor Edge Server </li></ul></ul><ul><ul><li>Oracle TopLink </li></ul></ul><ul><ul><li>Oracle Containers for J2EE (OC4J) </li></ul></ul><ul><ul><li>Oracle HTTP Server </li></ul></ul><ul><ul><li>Oracle Enterprise Manager </li></ul></ul><ul><ul><li>Oracle Web Cache </li></ul></ul><ul><ul><li>Oracle Wireless </li></ul></ul><ul><li>Oracle Data Integrator </li></ul><ul><li>Oracle Enterprise Content Management </li></ul><ul><ul><li>Information Rights Management </li></ul></ul><ul><ul><li>Universal Records Management </li></ul></ul><ul><ul><li>Imaging Server </li></ul></ul><ul><ul><li>Content Server </li></ul></ul><ul><ul><li>Content DB </li></ul></ul><ul><li>Oracle Portal </li></ul><ul><li>Oracle Coherence </li></ul>
  28. 28. Realizing SOA with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
  29. 29. Oracle’s SOA Platform <ul><li>Key Features </li></ul><ul><li>100% BPEL Support </li></ul><ul><li>Extensible Human Workflow </li></ul><ul><li>Flexible Rules Integration </li></ul><ul><li>Integrated Business Activity Monitor </li></ul><ul><li>JCA/WSIF Binding Framework </li></ul><ul><li>Integrated ESB, Registry, WSM </li></ul><ul><li>SOA enabled user interaction layer </li></ul><ul><li>Unified enterprise management </li></ul><ul><li>Integrated development environment </li></ul>Oracle Business Activity Monitor (BAM) Oracle BPEL Process Manager BPEL Process Workflow Rules fx Biz Partners RN, EDI Oracle Enterprise Service Bus Transformation | Routing | Messaging | Registry Registry Metadata store Java, Other services In Memory JCA CLR .Net, C# REST SOAP JCA Mainframe, IMS, CICS Yahoo! Amazon Oracle Apps, Siebel, SAP, Peoplesoft Oracle WebCenter Suite Oracle JDev Oracle BPA Suite Oracle Application Server / Oracle Enterprise Manager
  30. 30. SOA with Oracle Strategy / Value Proposition <ul><li>Comprehensive and Integrated </li></ul><ul><ul><li>Complete & Integrated Application Architecture, Single Vendor </li></ul></ul><ul><li>Service Oriented Architecture & BPM Enabled </li></ul><ul><ul><li>Flexible and Extensible Architecture that is Standards Based </li></ul></ul><ul><ul><li>BPM integration for true top down modeling </li></ul></ul><ul><li>Full SOA Life Cycle Support </li></ul><ul><ul><li>Plan, Design & Develop, Integrate, Orchestrate, Secure, Manage, Monitor, and Change </li></ul></ul><ul><li>Integrated, Intelligent and Secured Applications </li></ul><ul><ul><li>Increase Business Agility and Employee Productivity </li></ul></ul><ul><li>Increase Scalability and Reliability </li></ul><ul><ul><li>Lower Cost, Flexible Hardware Architecture (Grid) </li></ul></ul>BPM Lifecycle Develop Orchestrate Deploy Access Integrate Secure, Monitor & Manage Plan, Change Monitor Optimize Business Process Monitoring (BAM) Implement Deploy Execute Business Process Execution (BPE) Model Simulate Business Process Analysis (BPA)
  31. 31. Realizing Enterprise Security with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
  32. 32. Oracle Enterprise Security Identity And Access Management Data Security User Management Application Security Access Management Directory Management Platform Security Identity Audit Multi-level Access Control Encryption Monitoring & Alert DBA Security Operating System Security Authentication Service User Management Governance Risk Compliance Policy & Process Management Enterprise Control Compliance Analysis & Reporting Audit Automation Information Rights
  33. 33. Data Security: Oracle Products Realize regulatory compliance and protect against internal and external threats Core Platform Security <ul><li>User Management </li></ul><ul><li>Oracle Identity Management </li></ul><ul><li>Enterprise User Security </li></ul><ul><li>Data Protection </li></ul><ul><li>Oracle Advanced Security </li></ul><ul><li>Oracle Secure Backup </li></ul><ul><li>Access Control </li></ul><ul><li>Oracle Database Vault </li></ul><ul><li>Oracle Label Security </li></ul><ul><li>Virtual Private Database </li></ul><ul><li>Monitoring </li></ul><ul><li>Database Auditing </li></ul><ul><li>Oracle Audit Vault </li></ul><ul><li>EM Configuration Pack </li></ul>
  34. 34. Release wide map of Security Products Solution Virtual Private Database Fine Grained Auditing Network Encryption Oracle 8i Oracle Database 9iR2 Oracle Database 10g R1 Oracle Database 11gR1 Oracle Database 10g R2 Transparent Data Encryption Privileged User Controls Command Rules / Factors Oracle Database 9iR1 Tablespace Encryption Database Auditing Label Security Enterprise User Security Client Identifier Encryption API
  35. 35. Oracle Identity Management Suite Access Manager Adaptive Access Manager Enterprise Single Sign-On Identity Federation Web Services Manager Authentication Service for OS Access Management Identity Manager Role Manager Identity Admin. Internet Directory Virtual Directory Directory Services Identity Management Suite Audit & Compliance Enterprise Manager Identity Management Pack Suite Management Platform Security For Java Platform Security
  36. 36. Oracle’s Comprehensive IdM Solutions Strong authentication Risk based authorization Single sign-on Federation Web Services security Operating systems security Access Management Identity lifecycle Role management & mining Organization management Provisioning Reconciliation Password management Identity Admin. Storage Virtualization Synchronization Directory Services Audit Reporting Analytics Fraud Attestation Segregation of duties Audit & Compliance Service levels Performance Configuration Automation Suite Management Application server security Fusion Applications security Platform Security
  37. 37. Oracle’s Comprehensive IdM Solutions Info. Sec, Auditor End Users Administrator Reporting & Analytics Attestation Segregation of Duties Fraud Detection Strong Authentication Risk Based Authorization Federation Self-Service Identity Admin Account Admin Organization Admin Role Management Delegated Admin Business Apps, HR Provisioning Reconciliation Password Mgmt. WS Security Directories, DB LDAP Storage LDAP Synchronization LDAP Virtualization DB User Security App Server, OS Java Platform Security Authentication For Operating Systems Oracle Identity Management & Security Platform
  38. 38. Oracle Identity Solution Set HR System user info Oracle Identity Manager / Oracle Role Management Business Unit * Administration of users is delegated to the downstream organization Dealer Internal Employees 1,000,000’s of Internet Users Key supplier or benefits partner Oracle Access Manager / Oracle Adaptive Access Manager Web Services Manager App with Web Service App with Web Service Virtual Directory Directory B Directory A Delegation * 1,000’s of External Users Manages changes to user status (occasional) Manages user access (daily) Alternative or complement to meta-directories Secures BPEL / Web Services SSO across company boundaries Any App on Any Platform Federation Federation Oracle eSSO
  39. 39. Realizing Grid Computing with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
  40. 40. Grid Computing with Oracle <ul><li>Storage </li></ul><ul><ul><li>Automatic Storage Management </li></ul></ul><ul><li>Database Servers </li></ul><ul><ul><li>Real Application Clusters (RAC) </li></ul></ul><ul><li>Application Servers </li></ul><ul><ul><li>Application Server Clustering </li></ul></ul><ul><li>Grid Control </li></ul><ul><ul><li>Enterprise Manager Grid Control </li></ul></ul>
  41. 41. ASM: Storage Grid <ul><li>Oracle Automatic Storage Manager (ASM) </li></ul><ul><ul><li>Provisions storage capacity automatically to Oracle 10 g as needed </li></ul></ul><ul><ul><li>Stripes and Balances I/O </li></ul></ul><ul><ul><li>Mirrors: Immune to disk failure </li></ul></ul><ul><li>Oracle Automatic Backup and Recovery </li></ul><ul><ul><li>Single backup area for all Grid databases </li></ul></ul><ul><ul><li>Archive to tape </li></ul></ul>
  42. 42. RAC: The Database Grid Clustered Database Servers Mirrored Disk Subsystem High Speed Switch or Interconnect Hub or Switch Fabric Network Centralized Management Console Drive and Exploit Industry Advances in Clustering Users No Single Point Of Failure Interconnect Shared Cache Storage Area Network
  43. 43. Oracle Middleware Grid Support OC4J OC4J Web Client HTTP SOAP/ HTTP Web Cache OHS HTTP mod_oc4j AJP OC4J JDBC Process Monitoring and Notification Service with DRM <ul><li>Up/Down </li></ul><ul><li>Invalidation </li></ul><ul><li>Health </li></ul><ul><li>Up/Down </li></ul><ul><li>New </li></ul><ul><li>Health </li></ul><ul><li>Up/Down </li></ul><ul><li>Up/Down </li></ul>Web Services Application RAC
  44. 44. Scaling Behind Oracle HTTP Server OC4J OC4J OC4J OC4J OracleAS H4 OC4J OC4J OC4J OC4J OracleAS H3 OC4J OC4J OC4J OC4J OracleAS H5 OracleAS H1 OHS Router (mod_oc4j) OracleAS H2 OHS Router (mod_oc4j) <ul><li>Load balancing Between OHS/OC4J </li></ul><ul><li>Customized routing for Isolation </li></ul>HW Router
  45. 45. Scaling on Single Node: Multiple JVM Per OC4J OC4J Instance Configuration OracleAS Instance JVM JVM JVM JVM <ul><li>Simple. Turn on multiple JVM by setting numprocs > 1 </li></ul><ul><li>Identical configuration on each runtime instance </li></ul>
  46. 46. Distributed, In Memory Oracle Coherence Data Grid Service Coherence Data Grid Service Applications Distributed, In Memory Oracle Coherence Data Grid Coherence Clients For Data Access, Analytics, Transactions, Events Real Time Clients Application Servers Databases SOA Infrastructure
  47. 47. Enterprise Manager Grid Control Grid Management - Breadth of Capabilities Configuration Management Lifecycle Automation Application Performance Management Extensibility and Interoperability (Open Standards, Open Interfaces) Dashboards and Reports System Monitoring Service Level Management CMDB (Discover & Reconcile) Enterprise Manager Oracle Infrastructure Management Application Management Extended Infrastructure Management
  48. 48. Oracle Grid Computing <ul><li>Dynamic resource provisioning </li></ul><ul><ul><li>Realign IT resources as business needs change </li></ul></ul><ul><li>The most cost effective platform </li></ul><ul><ul><li>Commodity blade servers </li></ul></ul><ul><ul><li>Linux OS </li></ul></ul><ul><ul><li>Networked storage accessible via Infiniband, FibreChannel, or Ethernet </li></ul></ul><ul><li>Software to enable the platform </li></ul><ul><ul><li>Oracle Automatic Storage Manager (ASM) </li></ul></ul><ul><ul><li>Oracle Database </li></ul></ul><ul><ul><li>Oracle Application Server </li></ul></ul><ul><ul><li>Oracle Coherence </li></ul></ul><ul><ul><li>Oracle Enterprise Manager Grid Control </li></ul></ul>
  49. 49. A Q & Q U E S T I O N S A N S W E R S