Download
electronic business on the internet n.
Skip this Video
Loading SlideShow in 5 Seconds..
Electronic Business on the Internet PowerPoint Presentation
Download Presentation
Electronic Business on the Internet

Electronic Business on the Internet

144 Vues Download Presentation
Télécharger la présentation

Electronic Business on the Internet

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Electronic Business on the Internet E-Business Management and Workflow Technologies Authors: Natasa Ilic (inatasa@eunet.yu) Zeljko Djuricic (cendo@galeb.etf.bg.ac.yu) Prof. Dr. Veljko Milutinovic (vm@etf.bg.ac.yu)

  2. Nowadays: • “bricks and mortar” companies • Future: • “clicks and mortar” companies • with competition only a "click" away What is E-Business? • E-business is a use of Internet technologies • to improve and transform key business processes • Opportunity Today, Requirement Tomorrow

  3. Goals: Do We Need E-Business? • Can online technologies help me reduce costs? • How can I use information for a competitive advantage? • Can improved information management help me increase revenue? • Cost savings • Revenue growth • Customer satisfaction

  4. Problems: E-Business Infrastructure • E-business infrastructure consists of the hardware, software products, • and services needed to build, run,and manage e-business applications. • If your Web site isn't available, you don't exist • Slow performance will discourage customersfrom visiting your Web site. • People won't want to do business with you if you're not secure. • If you can't store/protect/manage the exploding volume of e-business data, then your e-business is out-of-business.

  5. Division of Solutions • Configuration (IT Resource) and Operations Management Solutions • Security Management Solutions • Storage Management Solutions • Performance & Availability Management Solutions • Application Management Solutions • Network & Systems Management Solutions • Web Management Solutions

  6. Overview of Solutions

  7. Tasks: Configuration & Operations MS • Centralized control for managing entire IT asset base • and all activities across diverse and distributed environment. • Managesoftware distribution - distribute, install, and manage • mission-critical applications on target locations from a central point. • Support remote control - control desktops, serversand execute • distributed applications across heterogeneous systems from one location. • Schedule Workload - automatically manage workloads. • Manage enterprise inventory- automatically scans for and collects • hardware and software inventory information across enterprise networks. • Help server-based data centers to realize optimal delivery of information.

  8. Security MS Integrated family of products that: • Effectively protect information from threats and malicious attacks, • Provide secure access for customers, prospects and partners by: • Managing user accounts across platforms, • Control the privacy of personal data, and • Managing authentication and authorization policies • Have policy-based, role-based, and automated security options • to furnish customized levels of validation

  9. StorageMS • Access, • Protection, • Recovery: • Replicate and back up mission-critical information, • Restore information from an alternate location, • Implement a disaster-recovery scenario at any time. • Manage storage across hardware and network systems (SAN) • Migrate files, • Take care of available space.

  10. Measure and analyze performance • Monitor the health of IT components Performance & Availability MS • Am I providing the highest level of service? • Is performance and availability up to par? • Do I need to grow my e-business infrastructure? • Tasks: • Kinds: • Application Management Solutions • Web Management Solutions • Network & Systems Management Solutions

  11. = 80 min// the technician resolved the problem ApplicationMS • Downtime costs when employees are idle • due to unavailability of applications required for their job functions • Example: 5 min// user calls Help Desk to complain of a problem + 60 min// user waits for a technician to arrive + 5 min// gathering information about problematic desktop + 10 min// the technician’s trying to resolve a problem OR = (80 x n) min// the technician discovers that the fault is not on the desktop but somewhere else, or needs a software patch, or a hardware component back in the data center.

  12. Web MS • Web infrastructure: • Web servers, • Application servers, and • Middleware • Tasks: • Ensuring site's optimum performance and availability • Monitoring the demands on your Web infrastructure • Analyzing actual customer experience • Maintainsecurity while operating outside firewall

  13. Lisa gives Karen access to the Web Services Manager, • where she has deployed two Quality of Service monitors: • At the entrance to the portal, • At the new integrated checkout page • This allows Karen to see real customer’s experience in real-time, • from her browser

  14. Karen is alerted to the fact that the average time • for the page to be delivered to the customers has nearly doubled. • Upon investigation Karen finds that the back-end systems are fine, • but render time of the portals welcome page is dramatically slower • than over the first week.

  15. When the Site Investigation is complete, Greg discovered that • one of his teams members has updated the new animated logo on the page • He reverts the graphics and republishes the Web page

  16. Greg uses QoS monitor to see if his changes have had the desired effect. • He configures a QoS job to look just at the portal URL, • with very quick sampling rate to get results immediately.

  17. With the use of Web Services Manager QoS monitor, • Karen notices a progressive slow down • in the performance of the new integrated checkout page.

  18. Lisa uses Synthetic Transaction Investigator (STI) • to examine the checkout pages

  19. Lisa looks at the • Web Component Manager screen • to identify the endpoints • associated with the checkout page • She sets a memory monitor on the server (with very short sampling interval)

  20. Lisa uses the real-time • reporter to zoom on to the • failing endpoint to see • a memory usage graph.

  21. Lisa decides that solution is to initiate a reboot of the failing machine. • Using Web Component Manager, she chooses: • The failing endpoint, • The reboot task to run immediately.

  22. Lisa checks the Web Server Availability monitor • to determine if the server is back online • She goes back to the • Synthetic Transaction Investigator • real-time graph and checks the • response time

  23. Network & Systems MS • Hidden costs of some solutions: • Customized installations, • Specialized skills, • Dedicated hardware, or • Lengthy implementation cycles • Tasks: • Provide everything a network administrator needs to diagnose, resolve, and evaluate the performance of specific resources • Provide the system analyst with detailed performance information across all levels of the infrastructure • Keep systems running at peakefficiency • Keep networks reliably and availably