SlideShare uma empresa Scribd logo
1 de 30
Budujme chytřejší planetu
Lotus Symposium 2009




Nové produkty Lotus
Tomáš Vávra
Petr Kunc
Hrozby
Statistiky ISS

1000     serverů ve farmě
22       datacenter
7 mld    objektů v databázi


100 000 přírůstků denně
150 mil zprac. objektů měsíčně
Lotus Protector for Mail Security


Anti Spam
Anti Virus
Konfigurace
Výhody Lotus Foundations

Jednoduchá instalace a správa
Centrální správa uživatelů
Zálohování a obnova (15 min)
Násobné připojení
VPN a firewall
Antivirus a antispam
Internetové služby
SW nebo HW + SW
Postaveno na SUSE Linuxu
ARCHITEKTURA

Lotus Foundations Core
     Automics                                UniConf Connectivity
    Presentation
    Supervisory

                                   NVS 1                             NVS 2
   Integrated
  Applications
                   UniConf




                                            UniConf Connector




                                                                              UniConf Connector
                                                                                                  Etc…
    - Samba                   Application                       Application
    - Apache
     - PPTP
       - idb
       etc...



                             SLES 2.6 Kernel
Základní instalace systému
Instalace doplňků (Domino)
MASHUP CENTER
Čtečky RSS kanálů
RSS   ATOM   XML
Propojování a transformace
Přístup přes speciální rozhraní...
...nebo vložením do webové stránky
...nebo vložením do webové stránky
Provázání widgetů
Backend – stavební kameny
...seznam widgetů
...seznam feedů
Možné zdroje pro feedy
„Long Tail“ – použití Mashups
                              Strategické, pro firmu
                              kritické aplikace
                              SOA, Portal, DB2, legacy
Počet uživatelů na aplikaci




                              applications, ...


                                    Aplikace v úpravě IT,
                                                               „Long Tail“ – příležitostné
                                    ale kontrolované
                                                               aplikace, plně v rukou IT
                                    SOA, Portal, DB2,
                                                               Mashups, jednoduché
                                    legacy applications, ...
                                                               aplikace zaměřené na určitý
                                    Mashups jako               problém. Kombinují externí
                                    prototyping.               a interní data.



                                            Počet aplikací
Příklad: Boeing

Mais conteúdo relacionado

Semelhante a Lotus Mashups, Foundations, Protector - Symposium 2009 Prague

Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827
surilige
 
Kahuna Corporate Profile
Kahuna Corporate ProfileKahuna Corporate Profile
Kahuna Corporate Profile
kahunasystems
 
manu_resume
manu_resumemanu_resume
manu_resume
Manu VS
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
abhi1112
 
Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017
Walter Foulkes
 
Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017
Walter Foulkes
 
Reconfigurable Service-Oriented Architectures
Reconfigurable Service-Oriented ArchitecturesReconfigurable Service-Oriented Architectures
Reconfigurable Service-Oriented Architectures
lseinturier
 
CVENJamesYu_201512
CVENJamesYu_201512CVENJamesYu_201512
CVENJamesYu_201512
James, Yu
 
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
mfrancis
 
Research platform architecture
Research platform architectureResearch platform architecture
Research platform architecture
Pierre Menard
 

Semelhante a Lotus Mashups, Foundations, Protector - Symposium 2009 Prague (20)

Oracle Fusion Middleware
Oracle Fusion MiddlewareOracle Fusion Middleware
Oracle Fusion Middleware
 
Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827
 
Kahuna Corporate Profile
Kahuna Corporate ProfileKahuna Corporate Profile
Kahuna Corporate Profile
 
Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827Ofm msft-interop-v5c-132827
Ofm msft-interop-v5c-132827
 
2012 06-15-jazoon12-sub138-eranea-large-apps-migration
2012 06-15-jazoon12-sub138-eranea-large-apps-migration2012 06-15-jazoon12-sub138-eranea-large-apps-migration
2012 06-15-jazoon12-sub138-eranea-large-apps-migration
 
manu_resume
manu_resumemanu_resume
manu_resume
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017
 
Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017Walter William Foulkes Resume Jan, 2017
Walter William Foulkes Resume Jan, 2017
 
Reconfigurable Service-Oriented Architectures
Reconfigurable Service-Oriented ArchitecturesReconfigurable Service-Oriented Architectures
Reconfigurable Service-Oriented Architectures
 
Temenos- Fiorano T24 Integration
Temenos- Fiorano T24 IntegrationTemenos- Fiorano T24 Integration
Temenos- Fiorano T24 Integration
 
Ppt00000
Ppt00000Ppt00000
Ppt00000
 
Kamlesh_Resume
Kamlesh_ResumeKamlesh_Resume
Kamlesh_Resume
 
Open Source Soa
Open Source SoaOpen Source Soa
Open Source Soa
 
IBM ConnectED SPOT104: Lightning-Fast Development of Native Mobile Apps for I...
IBM ConnectED SPOT104: Lightning-Fast Development of Native Mobile Apps for I...IBM ConnectED SPOT104: Lightning-Fast Development of Native Mobile Apps for I...
IBM ConnectED SPOT104: Lightning-Fast Development of Native Mobile Apps for I...
 
Complex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBaseComplex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBase
 
CVENJamesYu_201512
CVENJamesYu_201512CVENJamesYu_201512
CVENJamesYu_201512
 
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
Your last mile to SOA and Web 2.0- Lotus Expeditor for Devices - Eric MF Hsu,...
 
Research platform architecture
Research platform architectureResearch platform architecture
Research platform architecture
 
Web technologies
Web technologiesWeb technologies
Web technologies
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Lotus Mashups, Foundations, Protector - Symposium 2009 Prague

Notas do Editor

  1. Lotus Protector for Mail Security is a software solution sold as an end user license. It is deployed as a network appliance (physical or virtual, we’ll talk about that in a minute) that sits between your Domino Server’s SMTP interface and the wild wooly Internet, and filters all the bad stuff out before Domino has to deal with it. In reality, every SMTP server needs this and virtually every customer already has something, or else they would be drowning in spam. Our angle is we’re applying premium security technology, molded to satisfy the unique needs and requirements of Domino customers.The filtering software itself is high quality, 100% IBM-owned technology. The IBM Proventia product that shares the Protector engine is built upon Cobion, a long-time leader in multi-language spam filtering, that came to IBM in its Internet Security Systems (ISS) acquisition in 2006.The feature list will be covered in detail, but on this page we go through some of the competively critical and/or differentiating capabilities of Protector for Mail security.Dynamic host reputation is our implementation of what is often called IP Reputation Filtering or IP Filtering. This assigns a likelihood of spam based on its origination IP, according to a dynamic reputation system that examines the rate and ratio of spam received.Multi-level message analysis is the heart of the system, where a set of different filters is applied to look for different types of threats. This is where a lot of the proprietary stuff comes in, because it’s what makes the difference between 90-95% filter quality, or 98-99% like Protector does.Signature and behavioral virus is a “belt and suspenders” approach to protect against both known and unknown threats. Our signature antivirus is powered by the premium quality Sophos engine (the only part of Protector for mail security that isn’t 100% IBM technology), while the behavioral antivirus applies many of the same techniques as our spam analysis to spot threats that are unknown to the signature antivirus database.We’ll talk about our massive URL database, but the idea is that all spam has to have a method to fulfill its goals, and that typically is a link to somewhere on the Web. Through our database of over 84 million known bad URLs (inappropriate/pornographic or infected with malware), we can eliminate much of the most dangerous content with one simple check.Protector for Mail Security supports end user management of their own whitelists (allow) and blacklists (block), as well as a hosted version of the user’s quarantine. That’s a powerful feature in itself, but we’re extending this capability to Notes, for seamless integration of network filtering and client UI.We talked about the integration, but again the real point here is that we’ve narrowed our field of vision on behalf of our customer base, and given ourselves permission to see things from their point of view. Thus all the enhancements we’re making are toward delivering a product that extends and integrates what customer already do with Notes and Domino.Preemptive protection is a little different category of security, in this context. Whereas everything above is kind of looking out for all the bad stuff that bad people like to do, preemptive protection looks to stop things before they happen.So the rules/policy engine, which we’ll discuss in depth in a few minutes, can be applied to both incoming and outgoing e-mail to block the transmission of common categories of sensitive information, and be infinitely tuned to block customized kinds of information, specific to an industry or organization.We call out the place this product holds in the IBM Proventia security product family, because it takes advantage of all the work done in ISS to harden that line of intrusion prevention systems (IPSs), firewall, etc. This protects Protector against attacks on the software from vectors other than SMTP.
  2. Need speaker notes here
  3. Not every application is suited for the mashup style of development I just described. The sweet spot for mashups is when you want to create an application to address an immediate business issue or opportunity. These applications that are created to address a specific business problem are often referred to as situational applications. A defining characteristic of a situational application is that the implementation speed and flexibility of the app outweigh the need for governance and application perfection. In addition, if the right mashup ecosystem is in place, line of business can assemble their own applications.This is contrasted with mission critical, strategic applications, that are built and governed by IT. These types of applications usually serve a large number of users, and, as a result the need for governance and to minimize risk outweighs the need for speed and flexibility.In the middle is a bit of a gray area. Technologies and development styles to use really depends upon a customers’ specific needs. Some companies may want to use mashups for prototyping of the final app, while all of the underlying infrastructure and groundwork is being established.