This document summarizes a presentation on how Java technology can help organizations meet the challenges of building e-applications and becoming e-organizations. The presentation discusses the key requirements of e-applications including business models, information management, software engineering, integration, security and infrastructure challenges. It then outlines how Java addresses these challenges through its support for mobile code, network security, components and dynamic applications. The presentation concludes by discussing Java Enterprise Edition and the iPlanet product line.
1. ACS Annual Branch Conference
IT Trends 2000
24-26 March 2000
Java – A Strategic Foundation for
Your eOrganization
TM
Rajeev Arora
Web http://talk.to/rajeev
Email rajeev@systemsmiths.com.au
Principal E-Commerce Architect
S y stem S m iths.co m
C re a tin g .com s yste m s
2. In this presentation …
• Touched by an ‘e’– Anatomy of an e-Organization and
Requirements of an e-Application
– Key Requirements and Challenges
• Business Model, Information Management, Software Engineering
Challenge, Infrastructure, Integration and Security
• Java Technology – Strategic benefits from networkcentric innovation
– One and many flavours of Java!
– Java Technology Innovations
• Mobile Code, Network Security, Components and Dynamic Applications
– Java2 Enterprise Edition
– The iPlanet Product Line – Previously Netscape Product Line
• Conclusion
2000 ACS Annual Branch Conference
IT Trends
3. Anatomy of an e-Organization
and
Challenges for e-Applications
2000 ACS Annual Branch Conference
IT Trends
4. Touched by an “e”
Nature and Magnitude
The New New Thing
Examples of Wealth created by “Clark World” – Jim Clark companies:
Silicon Graphics, Netscape, WebMD/Healtheon
–
–
–
–
Co-founding Engineers (7): $223.50 million
CEOs (3): About $2 billion
Venture Capitalists (3): About $3 billion
Jim Clark: $3.2 billion
A Paradigm Shift
•
•
•
Internet is “the single most important event since the industrial
revolution.” (Jack Welch, Chairman – General Electric)
The revolution in information technology has altered the structure of
American Economy. (Alan Greenspan, Chairman. US Federal Reserve)
.. A new era of computing .. new levels of enablement to humanity … its
impact on humanity is comparable to invention of telephone and air travel.
(Rajeev Arora, “Using Enterprise Java”, 1996)
Source: The New New Thing – Michael Lewis
2000 ACS Annual Branch Conference
IT Trends
5. Touched by an “e”
Nature and Magnitude
Source: The New New Thing – Michael Lewis
2000 ACS Annual Branch Conference
IT Trends
6. Internet Business Drivers – Phase 1
Document
Publishing
One-Way
eCommerce
Closed-Loop
Business
Relationships
Revenue Enhancement
Cost Reduction
2000 ACS Annual Branch Conference
IT Trends
7. Internet Business Drivers – Phase 2
Revival of Extended
Families and Old
Friendships
Services – Utilities,
eTailers
Reduction of
Information
Lifecycle
Virtual communities –
• New ways of creating
existing relationships
• Creation of new
relationships
• New ways of interacting
with existing relationships
Workplace 1
Workplace 2
Workplace 3
…
?
Examples : Healtheon, eGroups.com,
eHow.com, ePinions.com,
Amazon.com, Application Service
Providers
E-zines
Interest Group 3
Search and
Discovery
Interest Group 1
Service
Provisioning and
Target Marketing
Interest Group 2
2000 ACS Annual Branch Conference
IT Trends
8. Application Service Providers (ASPs)
Application Sharing
VPN Link
Organization 1
Customers
Organization
Personalization
Internet
Individual
Personalization
Legacy
Application
Web Server
Organization 1
MultiOrganization
Application
ASP
Organization 2
Legacy
Application
Organization 2
Customers
VPN Link
Organization protected
Through Firewalls
2000 ACS Annual Branch Conference
IT Trends
9. Application Service Providers (ASPs)
Infrastructure Sharing
Web Server
Subscribers
Application
Server
Internet VPN
Wireless /
Mobile Network
Data
Storage
ASP
(e.g. xdrive.com)
Federated /
Syndicated
Application
(ASP?)
Other Examples:
• Data ASPs: Xdrive.com, zambeel.com
• Printing ASPs
2000 ACS Annual Branch Conference
IT Trends
10. Syndication of Content and Services
News Feeds
(Local, Intl, Sports, Fin)
Stock
Quotes
Warehouses
Inventory
Status
Available Shipping
Capacity
Publishers
(Some ASPs)
Aggregators
(Portals)
Subscribers
2000 ACS Annual Branch Conference
IT Trends
11. Summary of the Business Model Challenge
• Changes in the role of the Info-mediary
– New ways of creating existing relationships => New infomediaries
– Creation of new relationships
– New ways of interacting in existing relationships
– Security and trust management in relationships which exist
in virtual communities that cut across physical trust
boundaries
• Differentiators
– Ability to introduce new services for your captive
audience at minimum cost and lead-time
2000 ACS Annual Branch Conference
IT Trends
12. The Information Challenge
• The e-information model
– Self-describing data to achieve interoperability
• Syntax and semantics (syntax is easy, semantics hard)
– Structured and unstructured
– OO and relational
• Dynamic manipulation of self-describing data
– Discovery and binding
– Manipulation: Presentation and other operations on
data/objects
• Distributed Databases and Transactions
– Database Updates through multiple n-tier servers
– Replication and Cache Management
2000 ACS Annual Branch Conference
IT Trends
13. The Software Engineering Challenge
• Rapid Application Development
– Faster time-to-market is the winner
– Rely on rich library of “ready-to-use”components
• Developing substantially more complex software – reliably
– Managing increased complexity and size
– OO does to system design what structured programming did to
coding
• Extensibility
– Ability to “multi-purpose” an existing piece of software
• Cross-platform
– Network centric computing requires software to be “node”
independent => RM ODP Transparencies
2000 ACS Annual Branch Conference
IT Trends
14. The Integration Challenge
• Ability to integrate with any application
anywhere
• What do we mean by integration
– Exchange data
– Invoke operations on data (manipulation)
– Security integration (authentication and
authorization)
– Any time: Real-time or Deferred.
• Static and dynamic integration
2000 ACS Annual Branch Conference
IT Trends
15. The Security Challenge
• Network Security
– Platform and network security are inter-related
– A “weak” host anywhere on the Internet can be a
hazard to you
• Managing Trust
– Who you trust for what => Authentication and
authorization (among other security functions)
• Inter-operable security
– Ability to manage trust “interoperably”: across virtual
communities.
– Will virtual communities become the “real”
communities?
2000 ACS Annual Branch Conference
IT Trends
16. The Infrastructure Challenge
• Performance and Response Time
• High-availability: 24x7
– Ability to carry out hardware and software
outages with application outages
• Scalability
– Ability to start very small and grow without
changes to the logical architecture of the
“system”
2000 ACS Annual Branch Conference
IT Trends
17. Summary of Challenges
• Why challenges and not architecture
requirements?
– A mix of business re-engineering, technology and
processes is required; in addition to education of the
participants
– Technology standards and marketplace still in the
process of maturing
• How Java technology meets some key technology
challenges
– Information, Integration, Software Engineering and
Security
2000 ACS Annual Branch Conference
IT Trends
19. Why Java?
• The best sliced bread?
• Best OO Language?
• First-ever cross-platform development tool?
• First-ever write-once run anywhere solution?
• Quotes: Java advocates
• Network is the computer, (Java is the language).
• Cross platform development “nirvana”.
• Most secure platform for Internet applications.
• Quotes: Java Critics
• Wake me up when Java hasn’t changed for 3 months!
• Java is a science experiment out of control.
• Java virus!
2000 ACS Annual Branch Conference
IT Trends
20. Really, why Java? - Key Java Strengths
•
•
•
•
Object-orientation excellence
Network and Mobile Code Security
Cross-platform Development
Introspection, Dynamic Discovery and
Dynamic Binding (through RMI) – Secure.
• Components - Enterprise JavaBeans
Framework for Distributed Applications
2000 ACS Annual Branch Conference
IT Trends
21. Many Forms of Java
• The Programming Language
• The Platform
– Mobile Code – Applets and applications,
Remote Method Invocation and Agents
– Applications: Distributed, Cross-platform
– Micro, Pico and Smart Card Java
– Security Model – Managing trust on the
network
• The Component Model
– JavaBeans and Enterprise JavaBeans
2000 ACS Annual Branch Conference
IT Trends
22. Java Security (JDK 1.2)
• Domains unify local
and remote
deployment
locations.
• Resources may be
secured by name and
operations.
• Policy can be
centrally
administered within
an enterprise.
• Applets as well
applications can use
the model.
2000 ACS Annual Branch Conference
IT Trends
23. Evolution of the
Java Virtual Machine
• JVM Vendors
– Sun, IBM, Symantec, Inprise, Novell, TowerJ, …..
• Just in Time Compilers
– Binary translation.
– Code optimisation.
– Maturity issues.
• Current maturity level
– Native code compilers.
– Hot spot compiler - A new generation of compilers.
2000 ACS Annual Branch Conference
IT Trends
24. What’s Inside a Component?
• Structured metadata used by the system
to manage the component.
• Structured metadata used by component
user to compose new applications.
Component-specific data (Code, data,
HTML pages, scripts, images...)
One or more objects implementing the
component’s interfaces (including
component management)
Required interfaces (Application, Configuration)
Standard interfaces (Infrastructure, Management)
Discovery interfaces (Advertise Services)
2000 ACS Annual Branch Conference
IT Trends
25. Enterprise JavaBeans
Framework Model
Container Managed
Distributed Transactions
ODMG / OODBMS
Object-Relational
Custom Wrappers
Persistence
Txns
(OTS / JTS)
Declarative
CORBA Naming
LDAP / X500
File System
(Using JNDI)
CORBA 2.x
Compliant ORB
Load
Balancing
Session
Mgmt
Security
Naming
Factories
Enterprise
Bean
Enterprise
Bean
Enterprise
Bean
Client
IIOP,
RMI
Client’s View
Contract
Container Contract
ORB
In-house
Middleware
Extensions to the
EJB Standard for
In-house Use
Session state management for
transparent transactions
Container
Managed
Security
Activation, Deactivation and
Traffic Management
Audit
EJB Container
Deployment
Static and Dynamic
Deployment
Properties
EJB Server
2000 ACS Annual Branch Conference
IT Trends
26. Summary
• eBusiness places new demands for
– Agility: Time to market and flexibility
• An order of magnitude increase in
complexity
• Critical success factors
– Clear vision and execution at the following
levels
• Business Model and Process Planning
• Strategic and Tactical Architectures
• Technology SWOT
2000 ACS Annual Branch Conference
IT Trends
27. More Information
• http://java.sun.com/ and
http://www.ibm.com/java/
• Java Tutorial http://java.sun.com/docs/books/tutorial/
• Copy of this presentation can be downloaded
from
– http://systemsmiths.com/presentations
– Check out other Java related presentations
2000 ACS Annual Branch Conference
IT Trends
28. iPlanet eCommerce Products
A
Word from
Sponsor
• Previously Netscape product line
• E-Commerce Applications
– EDI, Internet Billing, Internet Merchants,
Internet Buying, Publishing and portals
• Community Support
– Internet Process Manager (Workflow)
• Infrastructure
– Security, Directories, Messaging
• More on http://www.iplanet.com/
2000 ACS Annual Branch Conference
IT Trends
29. S y stem S m iths.co m
C re a tin g .com s yste m s
A
Word from
Sponsor
• Strategic and Tactical IT and eBusiness Architecture
– New eBusiness Systems
– .com –ing existing systems
– N-tier client server
• Consulting
• Training and seminars
• Capabilities
–
–
–
–
Technology trends analysis and technology selection
Security, PKI and legacy integration
Internet Application Servers (Java, CORBA, Directories)
XML: Document Management and B2B Systems
2000 ACS Annual Branch Conference
IT Trends