1.79k likes | 1.96k Views
Electronic Business on the Internet. E-Business Management and Workflow Technologies. Authors: Natasa Ilic (inatasa@eunet.yu) Zeljko Djuricic (cendo@galeb.etf.bg.ac.yu) Prof. Dr. Veljko Milutinovic (vm@etf.bg.ac.yu). Nowadays:
E N D
Electronic Business on the Internet E-Business Management and Workflow Technologies Authors: Natasa Ilic (inatasa@eunet.yu) Zeljko Djuricic (cendo@galeb.etf.bg.ac.yu) Prof. Dr. Veljko Milutinovic (vm@etf.bg.ac.yu)
Nowadays: • “bricks and mortar” companies • Future: • “clicks and mortar” companies • with competition only a "click" away What is E-Business? • E-business is a use of Internet technologies • to improve and transform key business processes • Opportunity Today, Requirement Tomorrow
Goals: Do We Need E-Business? • Can online technologies help me reduce costs? • How can I use information for a competitive advantage? • Can improved information management help me increase revenue? • Cost savings • Revenue growth • Customer satisfaction
Problems: E-Business Infrastructure • E-business infrastructure consists of the hardware, software products, • and services needed to build, run,and manage e-business applications. • If your Web site isn't available, you don't exist • Slow performance will discourage customersfrom visiting your Web site. • People won't want to do business with you if you're not secure. • If you can't store/protect/manage the exploding volume of e-business data, then your e-business is out-of-business.
Division of Solutions • Configuration (IT Resource) and Operations Management Solutions • Security Management Solutions • Storage Management Solutions • Performance & Availability Management Solutions • Application Management Solutions • Network & Systems Management Solutions • Web Management Solutions
Tasks: Configuration & Operations MS • Centralized control for managing entire IT asset base • and all activities across diverse and distributed environment. • Managesoftware distribution - distribute, install, and manage • mission-critical applications on target locations from a central point. • Support remote control - control desktops, serversand execute • distributed applications across heterogeneous systems from one location. • Schedule Workload - automatically manage workloads. • Manage enterprise inventory- automatically scans for and collects • hardware and software inventory information across enterprise networks. • Help server-based data centers to realize optimal delivery of information.
Security MS Integrated family of products that: • Effectively protect information from threats and malicious attacks, • Provide secure access for customers, prospects and partners by: • Managing user accounts across platforms, • Control the privacy of personal data, and • Managing authentication and authorization policies • Have policy-based, role-based, and automated security options • to furnish customized levels of validation
StorageMS • Access, • Protection, • Recovery: • Replicate and back up mission-critical information, • Restore information from an alternate location, • Implement a disaster-recovery scenario at any time. • Manage storage across hardware and network systems (SAN) • Migrate files, • Take care of available space.
Measure and analyze performance • Monitor the health of IT components Performance & Availability MS • Am I providing the highest level of service? • Is performance and availability up to par? • Do I need to grow my e-business infrastructure? • Tasks: • Kinds: • Application Management Solutions • Web Management Solutions • Network & Systems Management Solutions
= 80 min// the technician resolved the problem ApplicationMS • Downtime costs when employees are idle • due to unavailability of applications required for their job functions • Example: 5 min// user calls Help Desk to complain of a problem + 60 min// user waits for a technician to arrive + 5 min// gathering information about problematic desktop + 10 min// the technician’s trying to resolve a problem OR = (80 x n) min// the technician discovers that the fault is not on the desktop but somewhere else, or needs a software patch, or a hardware component back in the data center.
Web MS • Web infrastructure: • Web servers, • Application servers, and • Middleware • Tasks: • Ensuring site's optimum performance and availability • Monitoring the demands on your Web infrastructure • Analyzing actual customer experience • Maintainsecurity while operating outside firewall
Lisa gives Karen access to the Web Services Manager, • where she has deployed two Quality of Service monitors: • At the entrance to the portal, • At the new integrated checkout page • This allows Karen to see real customer’s experience in real-time, • from her browser
Karen is alerted to the fact that the average time • for the page to be delivered to the customers has nearly doubled. • Upon investigation Karen finds that the back-end systems are fine, • but render time of the portals welcome page is dramatically slower • than over the first week.
When the Site Investigation is complete, Greg discovered that • one of his teams members has updated the new animated logo on the page • He reverts the graphics and republishes the Web page
Greg uses QoS monitor to see if his changes have had the desired effect. • He configures a QoS job to look just at the portal URL, • with very quick sampling rate to get results immediately.
With the use of Web Services Manager QoS monitor, • Karen notices a progressive slow down • in the performance of the new integrated checkout page.
Lisa uses Synthetic Transaction Investigator (STI) • to examine the checkout pages
Lisa looks at the • Web Component Manager screen • to identify the endpoints • associated with the checkout page • She sets a memory monitor on the server (with very short sampling interval)
Lisa uses the real-time • reporter to zoom on to the • failing endpoint to see • a memory usage graph.
Lisa decides that solution is to initiate a reboot of the failing machine. • Using Web Component Manager, she chooses: • The failing endpoint, • The reboot task to run immediately.
Lisa checks the Web Server Availability monitor • to determine if the server is back online • She goes back to the • Synthetic Transaction Investigator • real-time graph and checks the • response time
Network & Systems MS • Hidden costs of some solutions: • Customized installations, • Specialized skills, • Dedicated hardware, or • Lengthy implementation cycles • Tasks: • Provide everything a network administrator needs to diagnose, resolve, and evaluate the performance of specific resources • Provide the system analyst with detailed performance information across all levels of the infrastructure • Keep systems running at peakefficiency • Keep networks reliably and availably