Designing a Total Data Solution

Book description

Your company's global competitiveness depends on the utilization and maintenance of information. Current data handling practices-storing, updating, and accessing data-can be either a problem or a significant strategic advantage for your company. Designing a Total Data Storage Solution: Technology, Implementation, and Deployment gives you the inform

Table of contents

  1. Cover Page
  2. Best Practices Series
  3. Title Page
  4. Copyright Page
  5. Contributors
  6. Introduction: Designing a Total Data Storage Solution: Technology, Implementation, and Deployment
  7. Section I: Understanding the Environment
    1. Chapter 1: Best Practices for Managing the Decentralized IT Organization
      1. Initiating Organizational Change
      2. Aligning IT with Corporate Strategy
      3. Preparing a Qualitative Vision of Success
      4. Ensuring a Realignment Based on Facts Not Emotions
      5. Keeping IT Expenditures Visible
      6. Developing Applications in the Field…Developing Developers Centrally
      7. Maintaining Control of Infrastructure Development
      8. Outsourcing Selectively and Carefully
      9. Operating as a Consulting Organization
      10. Moving Project Initiation, Approval, and Financing to the Business Units
      11. Communicating Effectively and Continuously
      12. Recommended Course of Action
    2. Chapter 2: Controlling Information During Mergers, Acquisitions, and Downsizing
      1. Operations and Physical Security
      2. Communications and Network Security
      3. Mainframe, Mid-Range and PC Security
      4. Employee Security Concerns
      5. Information Security Staff
      6. Viruses
      7. Miscellaneous Controls
      8. Conclusion
    3. Chapter 3: Cost-Effective Management Practices for the Data Center
      1. Major Line-Item Expenses
      2. Reducing Staff Costs
      3. Hardware Costs
      4. Software Costs
      5. Maintenance
      6. Utilities and Conservation Practices
      7. Communications
      8. Supplies
      9. Conclusion
    4. Chapter 4: Assessing the Real Costs of a Major System Change
      1. Composition of IT Budgets
      2. Quantifying Production Workloads
      3. Service Levels
      4. Software Loading
      5. Efficiency of IT Resources
      6. Application Life Cycles
      7. Applications Development Variables
      8. Transition Costs
      9. Measurement Periods for Comparative Costing Company-to-Company Comparisons
      10. Conclusion
    5. Chapter 5: Application Servers: The Next Wave in Corporate Intranets and Internet Access
      1. Overview of a Web Server
      2. Overview of an Application Server
      3. Deployment in the Enterprise
      4. Security
      5. Scalability, Load Balancing, and Fault Tolerance
      6. Management
      7. Conclusion
  8. Section II: Data Architecture and Structure
    1. Chapter 6: The Importance of Data Architecture in a Client/Server Environment
      1. Creating a Data Architecture
      2. Multitier Data Architectures
      3. Key Concepts of Service-Based Architectures
      4. Case Study
      5. Conclusion
    2. Chapter 7: Business Aspects of Multimedia Networking
      1. Business Drivers of Multimedia Applications
      2. Applications of Networked Multimedia
      3. People-to-Server Applications
      4. People-to-People Applications
      5. Technical Requirements for Networked Multimedia Applications
      6. Guaranteeing Quality of Service
      7. System Considerations
      8. Barriers to Multimedia Networking
      9. Issues in Multimedia Systems Planning
      10. Planning Strategies
      11. Conclusion
    3. Chapter 8: Using Expert Systems Technology to Standardize Data Elements
      1. Value of Expert Systems
      2. The Data Element Standardization Process
      3. Defining Expert Systems
      4. The Expert Systems Development Process
      5. Conclusion
    4. Chapter 9: Managing Data on the Network: Data Warehousing
      1. Current Architecture
      2. The Opportunities and the Challenges
      3. Search and Destroy: Eliminate Redundancy
      4. Defining Core Data
      5. The Data Engine
      6. What is a Directory?
      7. Surround-Increase Flexibility of Present Systems
      8. Quality Data Structure
      9. Separate the Data from the Processing
      10. Conceptual Model
      11. Supporting Technology
      12. The Steak or the Sizzle?
      13. Implementating Data Warehousing Strategy
      14. Under which Shell is the Pea?
      15. More Complications
      16. Conclusion
    5. Chapter 10: Ensuring the Integrity of the Database
      1. Custodial Responsibility
      2. Database Integrity Concerns
      3. The Database Control Environment
      4. Planning Considerations
      5. Audit Objectives
      6. Internal Control Review
      7. Audit Tests by Objective
      8. Auditing a Case Technology Repository
      9. Auditing Client/Server Databases
      10. Recommended Course of Action
    6. Chapter 11: A Practical Example of Data Conversion
      1. Classifying Data Conversions
      2. Change in Hardware
      3. Migrating from One Operating System to Another
      4. Changes in File Access Method
      5. Migrating from One Application System to Another
      6. Conclusion
    7. Chapter 12: Legacy Database Conversion
      1. Preconceptions and Misconceptions
      2. Beyond Normalization
      3. Data Redundancy
      4. Historical Error Tracks
      5. Avoiding Hidden Pitfalls
      6. The Components of the Conversion Process
      7. Data History in the New System
      8. Conclusion
    8. Chapter 13: Design, Implementation, and Management of Distributed Databases—An Overview
      1. Today’s Technology
      2. Management Motivation
      3. Distributed Database Development Phases
      4. Corporation Strategy-Planning
      5. Overall Design of Distributed Database Strategy
      6. Distributed Environment Architecture
      7. Consideration for Standards
      8. Conclusion
    9. Chapter 14: Operating Standards and Practices for LANs
      1. Why LANs Require Standards
      2. Standards Committees
      3. Writing the Operating and Security Standards Document
      4. Conclusion
  9. Section III: Data Access
    1. Chapter 15: Using Database Gateways for Enterprisewide Data Access
      1. Database Gateway Setup
      2. Database Gateway Capacity Planning
      3. Gateway-to-Host Security
      4. Technical Support
      5. Disaster Recovery
      6. Add-On Software
      7. Conclusion
    2. Chapter: 16 Remote Access Concepts
      1. Introduction
      2. Driving Forces
      3. Two Approaches — Remote Node vs. Remote Control
      4. NT Remote Access Server
      5. Frame Relay — Public or Private Network
      6. IP Addressing (PPP for Dial Up)
      7. Using the Internet for Remote Access
      8. PPTP
      9. Equipment Required — Client
      10. Summary
    3. Chapter 17: Software Management: The Practical Solution to the Cost-of-Ownership Crisis
      1. What is Software Management?
      2. Reducing Ownership Costs, One-By-One
      3. Real Cost Savings Requires Real Usage Information
      4. Summary
    4. Chapter 18: Enterprise Messaging Migration
      1. Why Migrate?
      2. Project Sponsor(s)
      3. Use Consultants
      4. Develop a Migration Plan
      5. Communicate the Plan
      6. Execute the Plan
      7. Summary
    5. Chapter 19: Online Data Mining
      1. OLAM Mining Benefits
      2. OLAM Architecture
      3. OLAM Features
      4. Implementation of OLAM Mechanisms
      5. Analytical Mining Methods
      6. OLAM and Complex Data Types
      7. Conclusion
    6. Chapter 20: Placing Images and Multimedia on the Corporate Network
      1. Multimedia
      2. Storing Images on a LAN Server or Mainframe
      3. Accessing Images
      4. Internetworking
      5. Transferring Images through Wide Area Networks
      6. Conclusion
    7. Chapter 21: Data Subsets—PC-based Information: Is it Data for the Enterprise?
      1. Data Subset Synchronization Framework
      2. Steps in the Data Subset Synchronization Process
      3. Tracking Database Changes in the Client
      4. Tracking Database Changes in the Server
      5. Generating and Transferring Log Files for the Client
      6. Generating and Transferring Log Files for the Server
      7. IT Library Documents
      8. Applying Log Files
      9. Conflict Resolution
      10. Synchronizing Data Subsets
      11. Cascading Deletes on Client Database
      12. Restoring a Client Database
      13. Distribution of Application and Database Changes
      14. Conclusion
    8. Chapter 22: Failover, Redundancy, and High-Availability Applications in the Call Center Environment
      1. Terminology
      2. Understanding the Technology
      3. Technology Scenarios
      4. Change Drivers
      5. Systems Reconfigurations
      6. Cost Associations
      7. Conclusion
  10. Section IV: Data Management
    1. Chapter 23: Software Agents for Data Management
      1. Agent Definitions: Intelligent and Otherwise
      2. Characteristics of Autonomous Software Agents
      3. Agents for Heterogeneous Data Management
      4. Agents in Action
      5. Summary
    2. Chapter 24: Selecting a Cryptographic System
      1. Selecting a Cryptographic System
      2. Cryptographic Alternatives
      3. Conclusion
    3. Chapter 25: Data Security for the Masses
      1. Passive Threats
      2. Active Threats
      3. Paying Safely Over the Internet
      4. Encryption and Decryption
      5. Commercial Encryption Software
      6. Digital Signature Technology
      7. Securing E-Mail with S/MIME
      8. A Look at the Future
    4. Chapter 26: Firewall Management and Internet Attacks
      1. Laying the Groundwork for a Firewall
      2. Firewalls and the Local Security Policy
      3. Firewall Evaluation Criteria
      4. Firewall Techniques
      5. Developing a Firewall Policy and Standards
      6. Firewall Contingency Planning
      7. Conclusion
    5. Chapter 27: Evaluating Anti-Virus Solutions within Distributed Environments
      1. Distributed Security Needs
      2. Evaluation Reasoning
      3. Today’s Virus Profile
      4. Counteraction Technology Options
      5. Testing Obstacles
      6. Testing Preparation
      7. Testing Practices — Detection
      8. Testing Practices — Performance
      9. Testing Practices — Feature Set
      10. Cost of Ownership — Pricing
      11. Total Cost of Ownership — Support
      12. Vendor Evaluation
      13. Summarized Criteria
      14. Real-World Experiences
      15. Conclusion
    6. Chapter 28: The Future of Computer Viruses
      1. The First Recorded Viruses
      2. Viruses Targeted to Windows Platforms
      3. The Macro Virus
      4. Antivirus Software
      5. Viruses Transmitted over the Internet
      6. The Modern Day Virus Exchange and its Writers
      7. Object Orientation
      8. Conclusion
    7. Chapter 29: Strategies for an Archives Management Program
      1. Foundational Concepts
      2. Foundational Definitions
      3. Strategies for an Archives Management Initiative
      4. Recap
    8. Chapter 30: Managing EUC Support Vendors
      1. Bankers Trust: A Tale of Successful Vendor Management
      2. The NY Technology Roundtable: A Consensus View
      3. Analyzing EUC Services Vendors
      4. The “Continuum of Services” Perspective
      5. Cost of Ownership and the End User
      6. Moving Toward Credible Service Offerings
      7. Recommended Course of Action
    9. Chapter 31: Organizing for Disaster Recovery
      1. Notification Procedures
      2. Coordinating Off-Site Resources
      3. Employee Reactions to the Recovery Process
      4. Recommended Course of Action
  11. Section V: The Future Today
    1. Chapter 32: Web-enabled Data Warehousing
      1. System Components
      2. Web Warehouse Architecture
      3. Security
      4. Optimization Techniques
      5. Vendor Offerings
      6. Selecting a Tool
      7. Conclusion
    2. Chapter 33: Enterprise Extender: A Better Way to Use IP Networks
      1. Talking Transport
      2. What is Enterprise Extender?
    3. Chapter 34: Web-to-Host Connectivity Tools in Information Systems
      1. Framework for Implementation of Web-to-Host Access Tools
      2. Web-to-Legacy Data
      3. Web-to-Messaging Systems
      4. Web-to-Document Management and Workflow Systems
      5. Web-to-Business Intelligence Systems
      6. Web To ERP
      7. Web-to-Host Middleware and RAD Development Tools
      8. Conclusions
    4. Chapter 35: Business-to-Business Integration Using E-commerce
      1. Business Requirements
      2. Technical Requirements
      3. E-Commerce Product Selection
      4. E-Commerce Solution
      5. Security
      6. Conclusion
    5. Chapter 36: The Effect of Emerging Technology on the Traditional Business-to-Business Distribution Model
      1. Distribution Model Business Basics
      2. Historically, Technology was Embraced by the Channel
      3. Enter the Internet
      4. Core Internet Technology
      5. How the Internet is Negatively Affecting the Traditional Channel Value Proposition
      6. Ways the Internet is Enhancing the B2B Distribution Model (for those Savvy Enough to Recognize it)
      7. Conclusion
    6. Chapter 37: Customer Relationship Management
      1. High-Level Economical Shifts Reviewed
      2. E-Commerce
      3. Call Center Impact
      4. Customer Services: Call Centers
      5. Automated CRM Structure
      6. CRM Migration/Evaluation
      7. Relationship Costs
      8. Case Studies
      9. Conclusion

Product information

  • Title: Designing a Total Data Solution
  • Author(s): Roxanne Burkey, Charles V. Breakfield
  • Release date: September 2000
  • Publisher(s): Auerbach Publications
  • ISBN: 9781135516475