ITIL : 1.6 Architect Director |
---|
Architect: | The single most unique characteristic of our business is the relentless continual evolution of a CRM design since the mid 1970's. | While other businesses inovate and leap from one bright idea to another, we have pursued one single path to become the very best CRM service provider in the world. | No competitor could deliver a bespoke CRM application service in less time, with less cost or with greater quality. | No competitor can comprehend our extreme levels of flexibility and configurability - truely bespoke solutions to exactly match what is asked for. | The high level stragic benefits come from a verified architecture that has been refined and refined year after year without a change in direction. |
Technology: | The technology we deliver today is designed with a long term future, with the flexibility to make it cost effective to include continual improvements. | The Three Tier Architecture provides the most secure platform known to the computer industry - layers of hardware protection that can only be justified by the most professional of application service providers. |
Program Languages: | From an end user point of view, the computer languages used are: HTML with CSS and Javascript with AJAX. | The strength of these languages (and methods) is that they are international standards for open and transparent use without any propriatory vendor dependency. |
Future: | HTML5 is the evolving web page standard language that will dominate this decade. | Our policy is "any computer with any operating system in any location without the need for any installed software". | This means: | 1. Reduced dependence on browser add-ons and plug-ins such as Flash. | 2. Increased use of CANVAS for interactive graphics. | 3. Increased use of COOKIES to store 300 blocks of 4000 characters of local off-line data - some off-line working. | 4. Increased use of MICROFORMATS to provide some identity to reusable screen components. | 5. Increased use of browser LOCATION to provide the users current latitude and longtitude. | 6. Increased use of VIDEO using H.264 codex standards. | 7. Increased use of GADGETS that can communicate with one another. | 8. Increased use of SVG graphic images according to HTML-5 standards. | 9. Increased use of reusable web services for certain published and public information. |
Real Security: | While a lot of other information is provided regarding security, a few people can read about our three-tier architecture data center infrastructure that solves so many issues. | If every business could cost justify our three-tier architecture, then operational computer problems reported in the papers would just fade away. | With more than 20 years experience of this kind of architecture, we dare to publish how we achive the finest level of security that the IT industry has identified. |
Hardware: | The Microsoft Three-Tier Architecture began as a security concept in the 1980's and has continually evolved to become the finest architecture that humanity have been able to design with the active assistance of thousands of the best brains in the world. | 1. Web Servers. A set of dedicated web servers using Apache or MS Internet Information Services (IIS) are conected to the Internet via a traffic load sharing firewall. The role of a web server is to get prescribed logical information from an application server and format it as a web page to be sent to a browser. A web server has no idea where data comes from or how data is internally processed, its responsibilities are only with presentation of the user interface. Where a web server is busy or not available for any reason, other web servers can share the Internet traffic and continue to deliver a working service. | 2. Application Servers. Each web server is also connected via a local internal network to a set of dedicated application (COM) servers. The role of a application server is to request data from the database using prescribed procedures and to perform any internal processing according to business rules. Each application server is not conected to the Internet and so is hard to be attacked by any Internet conection. Where an application server is busy or not available for any reason, other application servers can share the web server requests and continue to deliver a working service. | 3. Database Server. Each Application server is also connected via a private internal network to a dedicated database server. The role of the database server is to execute prescribed procedures to get and put data in accordance with strict rules. The database server is encrypted and not conected to the Internet and so is hard to be attacked by any Internet conection. The database server has a priority encrypted message switch path up this hierarchy to other database servers in other remote locations that mirror applicable tables of data. |
Open and Transparent: | The three-tiers of hardware have no other installed software (not even anti-virus) that could be a point of weekness. An Email Server is a separate server connected to the Internet in the same way as a web server. The text of an email once cleaned of all infections may be routed to be stored in the database. A FTP Server is a separate server connected to the Internet in the same way as a web server. | Because the architecture used is so good, it can be documented so the finest brains in the world can analyse it for potential vulnerabilities. Each server has very few services enabled and no other installed software that could cause a point of vulnerability. | The hardware is not dependent on any suppliers system software and it can work with a diverse set of alternative system software. While Microsoft initially defined the three-tiers, it can equally be implemented in an IBM Linux environment. The database implementation may be SQL Server, DB2, Oracle or MySQL - the SQL procedure call to all DBMS are virtually identical. The web server implementation may be Apache using PHP or IIS using ASP - the result is an HTML web page with optional Javascript. | When a hacker tries to attack this architecture, as soon as they figure out that the web server does not hold any valuable data, they will quickly change direction and try to attack an in-house server that has many services running on the same machine with many points of vulnerabilities and locally stored valuable data. |
Document Control: | 1. Document Title: ITIL Architect Director. | 2. Reference: 161600. | 3. Keywords: ITIL Architect Director. | 4. Description: ITIL Architect Director. | 5. Privacy: Public education service as a benefit to humanity. | 6. Issued: 13 Feb 2016. | 7. Edition: 1.2. |
|
|