SlideShare a Scribd company logo
1 of 15
Using a Service
Oriented Architecture
to Manage IT Sprawl
Jeffrey Hurley
Background Photo: Hojusaram. "20070311-130204.jpg." Flickr. Yahoo!, 11 Mar. 2011. Web. 10 Feb. 2015.
Understanding Sprawl
• Evolving Technology Systems Sprawl
• Layered systems (custom applications, mainframes, client server, enterprise
resource planning, clouds, mobile devices, web applications)
• Cobbled solutions (point solutions over enterprise solutions)
• Inaccessible silos (multiple databases with same data maintained by different
groups)
• Systems snarled in spaghetti (point solutions and quick fixes)
• Changing Business Organizational Sprawl
• Geographic expansion
• Mergers and acquisitions
• Consolidation
• Outsourcing
Your Legacy is Drowning
You
• Making a change to the technology environment can be difficult and
risky with multiple layers of system dependencies
• Environmental complexity creates a situation where an individual
cannot understand all of the systems
• Maintaining these systems becomes increasingly expensive year-
over-year
• Corporate systems do not “talk” to each other (by design or
oversight)
• Multiple programming languages, architectures, and processing
(R/T, Batch, Sneaker Net)
• System and business “silos” create pockets of duplicate or similar
data (customer, financial, product, etc. databases)
IT Organizational Sprawl
• Fragmented by technology platform (split along vendor package or
platform)
• Fragmented by function (specialized groups: design, development,
testing, deploying, support, infrastructure, architecture, etc.)
• Fragmented by geographical location (outsourced, near sourced,
acquired, international expansion, etc.)
• Fragmented by corporate entity or subsidiary
• Fragmented by in-sourced vs. out-sourced teams
• Fragmented by business unit
• Fragmented by business focused team vs shared “IT services”
Translate Into Organizational
Challenges
• Political infighting
• Power struggles
• Obfuscation
• Hostility
• Perception of repeated failed, delayed, and overly
complex projects
Why the Focus on
Problems
• Service Oriented Architecture looks to fix these
problems
• At the same time these problems are the biggest
challenge to adoption of a Service Oriented
Architecture
• If you don’t understand what you have it will be
much harder to fix it.
A Service Oriented
Architecture Can
• Expose pre-existing functions trapped deep in
systems and services.
• Create interoperability agreements for system
reconciliation between departments and “technology
silos”
First, Establish Design
Policies
• Interoperability
• Discoverability
• Security
• Uniqueness
• Interface compliance
• Data format compliance
• Metrics
Set up Run-time Policies
• Service-level agreements: most common IT refrain. An agreement
between the providers and consumers on expectations and performance.
• Authentication: This is how your technology environment allows access to
systems most often referred to as a desire for “single sign-on”
• Authorization: Determining if a specific system or provider is able to
invoke a service
• Encryption: This has become an increasingly hot topic in the age of
security. Are we encrypting our systems, information, and data internally so
that they are not read by the wrong people
• Signatures: I am referring to the technical signature between systems
exchanging information, similar to when you sign for a package that
confirms you received it.
• Alerts and notifications: Requiring systems to have alerts properly built in
to notify the appropriate people and systems of current conditions.
• Metrics: What are the key performance indicators (KPIs) that will be
measuring systems and influencing decision making
Leave-and-Layer SOA
Strategy
• The services you need most are already in
existence in your current systems
• The current systems have already been tested for
consistency and reliability
• Building a service on top of an existing system is
faster and cheaper than creating a new service-
oriented system
• This will protect the dollars already invested in your
systems and technology
Use an Enterprise Service
Bus (ESB)
• You will need a tool to handle your legacy systems
that you plan to build services on top of
• The tool should handle multiple protocols, message
formats, and provide adaptors
• Communication patterns: request/reply,
publish/subscribe, fire and forget, etc.
• Provide service mediation to provide security, quality
of service, encryption, authentication, authorization,
load balancing, and monitoring
Create Organizational
Agility
• Establish a value chain mindset (it exists to deliver
customer satisfaction)
• Break application-centric thinking with cross
product/project assessment
• Challenge the organization and the staff to deliver
solutions via services and interoperability
• Establish stakeholders: business owners, architects,
developers, quality management,
operator/consumer
• Avoid creating services that require behavioral
changes unless absolutely necessary
Funding Your SOA
Strategy
• Use existing technologies and processes extending
the return on investment (ROI) and return on assets
(ROA) of existing systems
• Reuse will reduce costs across groups, seek to save
approximately 5% a year in support costs; using
these dollars to fund the SOA strategy
• Demonstrate faster time-to-live and as a result time-
to-market for new and existing systems utilizing the
SOA architecture
IT SOA Value Metrics
• Speed of deployment
• Number of reusable services
• Percentage of new services vs. existing (reused)
ones
• Percentage of reusable services vs non-reusable
services
• Number of applications bound to each service
• Lifetime cost of a service
Photo Credits
• Hojusaram. "20070311-130204.jpg." Flickr. Yahoo!,
11 Mar. 2011. Web. 10 Feb. 2015.
•

More Related Content

What's hot

The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
MT100 How we secure Big Data and protect our digital assets
MT100 How we secure Big Data and protect our digital assetsMT100 How we secure Big Data and protect our digital assets
MT100 How we secure Big Data and protect our digital assetsDell EMC World
 
Tableau for Nonprofits
Tableau for NonprofitsTableau for Nonprofits
Tableau for Nonprofits501 Commons
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...Dell World
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...Peter Daalmans
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
MT 102 Dell Effectively powering the 21st century digital workplace
MT 102 Dell Effectively powering the 21st century digital workplaceMT 102 Dell Effectively powering the 21st century digital workplace
MT 102 Dell Effectively powering the 21st century digital workplaceDell EMC World
 
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell FilrGWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell FilrGWAVA
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Erin
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud ComputingCentriLogic
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Jeff Davis
 

What's hot (18)

The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
MT100 How we secure Big Data and protect our digital assets
MT100 How we secure Big Data and protect our digital assetsMT100 How we secure Big Data and protect our digital assets
MT100 How we secure Big Data and protect our digital assets
 
Tableau for Nonprofits
Tableau for NonprofitsTableau for Nonprofits
Tableau for Nonprofits
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Abiquo
AbiquoAbiquo
Abiquo
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
MT 102 Dell Effectively powering the 21st century digital workplace
MT 102 Dell Effectively powering the 21st century digital workplaceMT 102 Dell Effectively powering the 21st century digital workplace
MT 102 Dell Effectively powering the 21st century digital workplace
 
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell FilrGWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
 
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud Computing
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
 

Similar to Using a Service Oriented Architecture to Manage IT Sprawl

Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Nathan Bijnens
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricNathan Bijnens
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationRomana Sharmin
 
MuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration ArchitectureMuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration ArchitectureKim Clark
 
Digital intelligence satish bhatia
Digital intelligence satish bhatiaDigital intelligence satish bhatia
Digital intelligence satish bhatiaSatish Bhatia
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo
 
Managing Large Amounts of Data with Salesforce
Managing Large Amounts of Data with SalesforceManaging Large Amounts of Data with Salesforce
Managing Large Amounts of Data with SalesforceSense Corp
 
Rapidly Enable Tangible Business Value through Data Virtualization
Rapidly Enable Tangible Business Value through Data VirtualizationRapidly Enable Tangible Business Value through Data Virtualization
Rapidly Enable Tangible Business Value through Data VirtualizationDenodo
 
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?Edunomica
 
API Automation and TDD to Implement Master Data Survivorship Rules
API Automation and TDD to Implement Master Data Survivorship RulesAPI Automation and TDD to Implement Master Data Survivorship Rules
API Automation and TDD to Implement Master Data Survivorship RulesSmartBear
 
Cambridge Breakfast Seminar
Cambridge Breakfast SeminarCambridge Breakfast Seminar
Cambridge Breakfast SeminarNuoDB
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsChristopher Foot
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...Eduardo Gonzalez Loumiet, MBA, PMP, CPHIMS
 
Microservices for Application Modernisation
Microservices for Application ModernisationMicroservices for Application Modernisation
Microservices for Application ModernisationAjay Kumar Uppal
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
Declare Victory with Big Data
Declare Victory with Big DataDeclare Victory with Big Data
Declare Victory with Big DataJ On The Beach
 
Observability in serverless solutions
Observability in serverless solutionsObservability in serverless solutions
Observability in serverless solutionsLeonardo Murillo
 

Similar to Using a Service Oriented Architecture to Manage IT Sprawl (20)

Data Mesh
Data MeshData Mesh
Data Mesh
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Cloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On OrganizationCloud Computing & Impact Of IT On Organization
Cloud Computing & Impact Of IT On Organization
 
MuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration ArchitectureMuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration Architecture
 
Digital intelligence satish bhatia
Digital intelligence satish bhatiaDigital intelligence satish bhatia
Digital intelligence satish bhatia
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
 
Managing Large Amounts of Data with Salesforce
Managing Large Amounts of Data with SalesforceManaging Large Amounts of Data with Salesforce
Managing Large Amounts of Data with Salesforce
 
Rapidly Enable Tangible Business Value through Data Virtualization
Rapidly Enable Tangible Business Value through Data VirtualizationRapidly Enable Tangible Business Value through Data Virtualization
Rapidly Enable Tangible Business Value through Data Virtualization
 
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
 
API Automation and TDD to Implement Master Data Survivorship Rules
API Automation and TDD to Implement Master Data Survivorship RulesAPI Automation and TDD to Implement Master Data Survivorship Rules
API Automation and TDD to Implement Master Data Survivorship Rules
 
Cambridge Breakfast Seminar
Cambridge Breakfast SeminarCambridge Breakfast Seminar
Cambridge Breakfast Seminar
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud Systems
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
 
Microservices for Application Modernisation
Microservices for Application ModernisationMicroservices for Application Modernisation
Microservices for Application Modernisation
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Declare Victory with Big Data
Declare Victory with Big DataDeclare Victory with Big Data
Declare Victory with Big Data
 
Observability in serverless solutions
Observability in serverless solutionsObservability in serverless solutions
Observability in serverless solutions
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Using a Service Oriented Architecture to Manage IT Sprawl

  • 1. Using a Service Oriented Architecture to Manage IT Sprawl Jeffrey Hurley Background Photo: Hojusaram. "20070311-130204.jpg." Flickr. Yahoo!, 11 Mar. 2011. Web. 10 Feb. 2015.
  • 2. Understanding Sprawl • Evolving Technology Systems Sprawl • Layered systems (custom applications, mainframes, client server, enterprise resource planning, clouds, mobile devices, web applications) • Cobbled solutions (point solutions over enterprise solutions) • Inaccessible silos (multiple databases with same data maintained by different groups) • Systems snarled in spaghetti (point solutions and quick fixes) • Changing Business Organizational Sprawl • Geographic expansion • Mergers and acquisitions • Consolidation • Outsourcing
  • 3. Your Legacy is Drowning You • Making a change to the technology environment can be difficult and risky with multiple layers of system dependencies • Environmental complexity creates a situation where an individual cannot understand all of the systems • Maintaining these systems becomes increasingly expensive year- over-year • Corporate systems do not “talk” to each other (by design or oversight) • Multiple programming languages, architectures, and processing (R/T, Batch, Sneaker Net) • System and business “silos” create pockets of duplicate or similar data (customer, financial, product, etc. databases)
  • 4. IT Organizational Sprawl • Fragmented by technology platform (split along vendor package or platform) • Fragmented by function (specialized groups: design, development, testing, deploying, support, infrastructure, architecture, etc.) • Fragmented by geographical location (outsourced, near sourced, acquired, international expansion, etc.) • Fragmented by corporate entity or subsidiary • Fragmented by in-sourced vs. out-sourced teams • Fragmented by business unit • Fragmented by business focused team vs shared “IT services”
  • 5. Translate Into Organizational Challenges • Political infighting • Power struggles • Obfuscation • Hostility • Perception of repeated failed, delayed, and overly complex projects
  • 6. Why the Focus on Problems • Service Oriented Architecture looks to fix these problems • At the same time these problems are the biggest challenge to adoption of a Service Oriented Architecture • If you don’t understand what you have it will be much harder to fix it.
  • 7. A Service Oriented Architecture Can • Expose pre-existing functions trapped deep in systems and services. • Create interoperability agreements for system reconciliation between departments and “technology silos”
  • 8. First, Establish Design Policies • Interoperability • Discoverability • Security • Uniqueness • Interface compliance • Data format compliance • Metrics
  • 9. Set up Run-time Policies • Service-level agreements: most common IT refrain. An agreement between the providers and consumers on expectations and performance. • Authentication: This is how your technology environment allows access to systems most often referred to as a desire for “single sign-on” • Authorization: Determining if a specific system or provider is able to invoke a service • Encryption: This has become an increasingly hot topic in the age of security. Are we encrypting our systems, information, and data internally so that they are not read by the wrong people • Signatures: I am referring to the technical signature between systems exchanging information, similar to when you sign for a package that confirms you received it. • Alerts and notifications: Requiring systems to have alerts properly built in to notify the appropriate people and systems of current conditions. • Metrics: What are the key performance indicators (KPIs) that will be measuring systems and influencing decision making
  • 10. Leave-and-Layer SOA Strategy • The services you need most are already in existence in your current systems • The current systems have already been tested for consistency and reliability • Building a service on top of an existing system is faster and cheaper than creating a new service- oriented system • This will protect the dollars already invested in your systems and technology
  • 11. Use an Enterprise Service Bus (ESB) • You will need a tool to handle your legacy systems that you plan to build services on top of • The tool should handle multiple protocols, message formats, and provide adaptors • Communication patterns: request/reply, publish/subscribe, fire and forget, etc. • Provide service mediation to provide security, quality of service, encryption, authentication, authorization, load balancing, and monitoring
  • 12. Create Organizational Agility • Establish a value chain mindset (it exists to deliver customer satisfaction) • Break application-centric thinking with cross product/project assessment • Challenge the organization and the staff to deliver solutions via services and interoperability • Establish stakeholders: business owners, architects, developers, quality management, operator/consumer • Avoid creating services that require behavioral changes unless absolutely necessary
  • 13. Funding Your SOA Strategy • Use existing technologies and processes extending the return on investment (ROI) and return on assets (ROA) of existing systems • Reuse will reduce costs across groups, seek to save approximately 5% a year in support costs; using these dollars to fund the SOA strategy • Demonstrate faster time-to-live and as a result time- to-market for new and existing systems utilizing the SOA architecture
  • 14. IT SOA Value Metrics • Speed of deployment • Number of reusable services • Percentage of new services vs. existing (reused) ones • Percentage of reusable services vs non-reusable services • Number of applications bound to each service • Lifetime cost of a service
  • 15. Photo Credits • Hojusaram. "20070311-130204.jpg." Flickr. Yahoo!, 11 Mar. 2011. Web. 10 Feb. 2015. •