SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
NORTHERN TRUST




                                     Beyond the Wireless Tether
                                     An “Occasionally Connected” Architecture




     A Gartner Catalyst Case Study
     2012.08.20
     Christopher Price
     Vice President
     The Northern Trust Company
© 2012 Northern Trust Corporation                                         northerntrust.com
About me…


    Christopher Price
    Vice President, The Northern Trust Company
    cp68@ntrs.com


         Architecture and Innovation Team member
                 IT Standards and Guidance
                 Evaluation of New Technologies
                 R&D for High Value Projects
         At Northern Trust for 7 years, experience with:
                 Enterprise Architecture
                 Software Design and Development




2   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



          Background                     on Northern Trust
          Determining                  the Requirements
          Application               Architecture
          Infrastructure

          Security




3   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Northern Trust Overview

                                                  Founded in 1889, Northern Trust Corporation is a global
                                                  leader in asset servicing, asset management, wealth
                                                  management, and banking for personal and institutional
                                                  clients.




      Assets under custody
         US$4.6 trillion

Assets under management
     US$704 billion

             Banking Assets
             US$94 billion
*As of 30 June 2012


 4        “Beyond the Wireless Tether” - Gartner Catalyst 2012
Northern Trust’s Global Presence


                  Chicago (Corporate HQ)                   Abu Dhabi   Guernsey   London
                  Toronto                                  Amsterdam   Jersey     Luxembourg
                  New York                                 Dublin      Limerick   Stockholm


                                                                                        Bangalore
                                                                                        Beijing
                                                                                        Hong Kong
                                                                                        Melbourne
A network of offices                                                                    Singapore
 in 18 States and                                                                       Tokyo
 Washington D.C.




5   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



          Background                  on Northern Trust
          Determining                    the Requirements
          Application               Architecture
          Infrastructure

          Security




6   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Determining the Requirements

       Focus on what matters to clients, not on technology.
       Relationship          managers want latest mobile technology but need:
              All   data necessary to conduct meeting
              Minimal        distractions
              Ability     to work anywhere the client is located


                          Having “zero  bars”  shouldn’t  hinder  the  conversation!




7   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Business Requirements

        Need to avoid this situation….




    WELCOME - Today’s Agenda

     9am – 9:05am                      Attempt to connect to available Wi-Fi with incorrect settings
     9:05am – 9:15am                   Give up and struggle with slow 3G connection
     9:15am – 9:20am                   Locate presentation materials with assistance from help desk
     9:20am – 9:30am                   Diagnose problems with projector and screen
     9:30am – 10am                     Finally… Discuss client’s financial goals




8    “Beyond the Wireless Tether” - Gartner Catalyst 2012
Technology Requirements

       The two primary technology requirements...
          Disconnected               mode
             Maximize       time with client
               No connections to establish.
               No interruptions caused by poor reception, network outage, etc.
             Quick

               Highly responsive user interface by minimizing server requests.
               Not relying on slow connections to transfer large documents during meetings.
             Reach

            Client meeting location not bounded by reach of antennas.
            Want to accompany the client on their yacht? – No problem.
          Security
             Highly     sensitive client data being stored.
             Mobile     device more susceptible to loss and theft.
             Primarily     using untrusted networks.


9   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda


           Background                  on Northern Trust
           Determining                  the Requirements
           Application                  Architecture
           Infrastructure

           Security




10   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices

        “Got the requirements, let’s build a mobile app!” ...not so fast.

             Need to establish formal guidance for building mobile solutions at
              Northern Trust with help from vendors, consultants and peers.
             The result: Northern Trust Mobile Strategy and Reference Architecture

                                                      Strategy contains guidance for management:
                                                      • Definition of mobile apps, devices and content
                                                      • Governance recommendations
                                                      • Usage Policies
                                                      • Risks
                                                      • Etc.

                                                      Architecture contains developer guidance:
                                                      • Style of app: web, native, or hybrid
                                                      • Security
                                                      • Device support
                                                      • Service development
                                                      • Etc.


11   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices


      First major decision…web, native or hybrid*?

                                      Web/Hybrid            Native




* Defined as a thin native wrapper around a primarily HTML/JS view. Hybrid apps fall within a
spectrum between web and native depending upon how many native features are utilized.

12   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices


      Decision: Native Application Architecture

          1) Secure offline operation
             Secure          local storage
               “Why  not  HTML5  local  storage?”
                Size restrictions (app is a storage hog!)
                Reliability – browser cache easily erased
                Security concerns
          2) Superior presentation
            Better         appearance
            Greater           app awareness
          3) Performance
            Fewer          round-trips to server
            Quicker           rendering
13   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices

      BUT: Typically don’t recommend native at Northern Trust

           Web         or hybrid apps are preferred because:
             Cheaper            to build with in-house web expertise
             Majority         of effort is reusable
             Can        be indistinguishable from native with HTML5/JavaScript
             Quicker           to deliver new features




14   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices




                                                            Gartner, 2012




15   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda


           Background                   on Northern Trust
           Determining                  the Requirements
           Application               Architecture
           Infrastructure

           Security




16   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure




           1. User places documents in folder on internal portal
           2. Synchronization initiated by user from iOS app while online
           3. Middleware sends updates back and forth between mobile
                app and source systems.

17   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



          Decision: iOS Platform Only
           Internal           application. Control of device choice
           Users           more familiar with Apple products. Less training.
           Fewer           platform specific updates.

                              2012 Market share




                                                       Apple
                                                       Android
                                                       Microsoft
                                                       Other




     http://www.gartner.com/it/page.jsp?id=1980115


18      “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



        Decision: Vended service gateway
         Layer         7 is edge security for external services
         Integration             with authentication providers
         Speaks            multiple security protocols
         Custom            solution added no value




http://www.gartner.com/technology/reprints.do?id=1-17Q04QM&ct=111019&st=sg

19    “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



      Decision: ReST over SOAP
       Lightweight         - important for mobile
       Heavier       SOAP difficult to handle on mobile client.
       Mobile      clients have APIs for handling basic URL calls
       Poor     web service support in iOS/Android unlike in Java or .NET




20   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



      Decision: Custom Middleware
       Purpose        – Extract data from source systems, feed to mobile client apps
       Why Custom?

        Anticipated consolidation within market for mobile middleware (MEAP)
        Cloud based solution not acceptable for use case
        Custom source system integration




21   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



           Background                  on Northern Trust
           Determining                  the Requirements
           Application               Architecture
           Infrastructure

           Security




22   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Security

          Decision: Plan for the worst with numerous security layers

          Over the wire
             OAuth          2.0
                Popular standard for cloud APIs
                Open to federation in future with 3rd parties
                Easy to use with ReST services

             Two-factor
                Access token required due to sensitivity of data
                RSA SecurID Software Token + iOS SDK chosen for limited
                  user involvement
                Better user experience, but still as secure as physical token



23   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Security




          On device
             Mobile         Device Management (MDM)
                Passcode requirement
                Remote data wipe

             Local        Authentication
                Support offline identification of users
                Future SSO with all Northern Trust applications

             Local        Encryption
                Secure whether online or off
                Strongest available algorithms
                Double security – iOS platform and custom
24   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Summary



                                             Listen to your clients

                                             Define your Strategy

                                             Design for Resilience
                                                Go Web by default

                                                   Buy a Gateway

                                             Caution: Middleware
                                  Security: Plan for a worst case


25   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Questions?




                         Thank you for attending!
26   “Beyond the Wireless Tether” - Gartner Catalyst 2012

Más contenido relacionado

La actualidad más candente

Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionDataStax
 
How Startups can leverage big data?
How Startups can leverage big data?How Startups can leverage big data?
How Startups can leverage big data?Rackspace
 
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOCaserta
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionNeo4j
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM
 
SENTIENT ENTERPRISE
SENTIENT ENTERPRISESENTIENT ENTERPRISE
SENTIENT ENTERPRISETeradata
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAsAdvisorAssist, LLC
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionEnterprise Management Associates
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science VMware Tanzu
 
Neo4j Aura Enterprise
Neo4j Aura EnterpriseNeo4j Aura Enterprise
Neo4j Aura EnterpriseNeo4j
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudFoundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudPrecisely
 
How to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics WebinarHow to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics WebinarDatameer
 
JMR BITSHIFT Solution Overview 9-6-16
JMR BITSHIFT Solution Overview 9-6-16JMR BITSHIFT Solution Overview 9-6-16
JMR BITSHIFT Solution Overview 9-6-16Incognate Limited
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportCorporacion Colombia Digital
 

La actualidad más candente (20)

Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
 
How Startups can leverage big data?
How Startups can leverage big data?How Startups can leverage big data?
How Startups can leverage big data?
 
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICO
 
DLP
DLPDLP
DLP
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in Action
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019
 
SENTIENT ENTERPRISE
SENTIENT ENTERPRISESENTIENT ENTERPRISE
SENTIENT ENTERPRISE
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science Pivotal Digital Transformation Forum: Data Science
Pivotal Digital Transformation Forum: Data Science
 
Neo4j Aura Enterprise
Neo4j Aura EnterpriseNeo4j Aura Enterprise
Neo4j Aura Enterprise
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudFoundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
 
How to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics WebinarHow to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics Webinar
 
JMR BITSHIFT Solution Overview 9-6-16
JMR BITSHIFT Solution Overview 9-6-16JMR BITSHIFT Solution Overview 9-6-16
JMR BITSHIFT Solution Overview 9-6-16
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision Support
 

Destacado

The Northern Trust Difference
The Northern Trust DifferenceThe Northern Trust Difference
The Northern Trust Differencematurepalate
 
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...CA Technologies
 
Northern Trust
Northern TrustNorthern Trust
Northern TrustSociaLogic
 
Gartner - Sales opportunities for Exceptional People
Gartner - Sales opportunities for Exceptional PeopleGartner - Sales opportunities for Exceptional People
Gartner - Sales opportunities for Exceptional PeopleS R
 
Standard life gars
Standard life garsStandard life gars
Standard life garsBerlinBear69
 
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)Siri ESTANDARD
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSebastien Gioria
 
Plannet Esolutions Limited Profile.
Plannet Esolutions Limited Profile.Plannet Esolutions Limited Profile.
Plannet Esolutions Limited Profile.Divyansh Batra
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單StandardlifeAEM
 

Destacado (14)

The Northern Trust Difference
The Northern Trust DifferenceThe Northern Trust Difference
The Northern Trust Difference
 
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
 
Northern Trust
Northern TrustNorthern Trust
Northern Trust
 
Gartner - Sales opportunities for Exceptional People
Gartner - Sales opportunities for Exceptional PeopleGartner - Sales opportunities for Exceptional People
Gartner - Sales opportunities for Exceptional People
 
Standard life gars
Standard life garsStandard life gars
Standard life gars
 
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
 
BSAMMBO
BSAMMBOBSAMMBO
BSAMMBO
 
Drugstore.com Gartner Slides
Drugstore.com Gartner SlidesDrugstore.com Gartner Slides
Drugstore.com Gartner Slides
 
Gartner Introduction
Gartner IntroductionGartner Introduction
Gartner Introduction
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
Plannet Esolutions Limited Profile.
Plannet Esolutions Limited Profile.Plannet Esolutions Limited Profile.
Plannet Esolutions Limited Profile.
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Solution Blueprint - Customer 360
Solution Blueprint - Customer 360Solution Blueprint - Customer 360
Solution Blueprint - Customer 360
 
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
 

Similar a Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile Access Gateway: Beyond the Wireless Tether: An “Occasionally-Connected” Architecture

Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssChainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssMohan Venkataraman
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationHow to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationEnterprise Management Associates
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Open Networking Summits
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce Pactera_US
 
Journey to the Cloud
Journey to the CloudJourney to the Cloud
Journey to the CloudPete Nieminen
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019Stavros Zervoudakis
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
 
2012 RightScale Road Trip - San Jose
2012 RightScale Road Trip - San Jose2012 RightScale Road Trip - San Jose
2012 RightScale Road Trip - San JoseRightScale
 
SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment stefriche0199
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud RoundtableInternap
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote addressthreesixty
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureMarketingArrowECS_CZ
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesRehanShrivastav
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

Similar a Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile Access Gateway: Beyond the Wireless Tether: An “Occasionally-Connected” Architecture (20)

Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ssChainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationHow to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
 
Journey to the Cloud
Journey to the CloudJourney to the Cloud
Journey to the Cloud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises Infrastructure
 
Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11Sukhbir jasuja digital_trends_11
Sukhbir jasuja digital_trends_11
 
2012 RightScale Road Trip - San Jose
2012 RightScale Road Trip - San Jose2012 RightScale Road Trip - San Jose
2012 RightScale Road Trip - San Jose
 
SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud Roundtable
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud future
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 

Más de CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

Más de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile Access Gateway: Beyond the Wireless Tether: An “Occasionally-Connected” Architecture

  • 1. NORTHERN TRUST Beyond the Wireless Tether An “Occasionally Connected” Architecture A Gartner Catalyst Case Study 2012.08.20 Christopher Price Vice President The Northern Trust Company © 2012 Northern Trust Corporation northerntrust.com
  • 2. About me… Christopher Price Vice President, The Northern Trust Company cp68@ntrs.com  Architecture and Innovation Team member  IT Standards and Guidance  Evaluation of New Technologies  R&D for High Value Projects  At Northern Trust for 7 years, experience with:  Enterprise Architecture  Software Design and Development 2 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 3. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 3 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 4. Northern Trust Overview Founded in 1889, Northern Trust Corporation is a global leader in asset servicing, asset management, wealth management, and banking for personal and institutional clients. Assets under custody US$4.6 trillion Assets under management US$704 billion Banking Assets US$94 billion *As of 30 June 2012 4 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 5. Northern Trust’s Global Presence Chicago (Corporate HQ) Abu Dhabi Guernsey London Toronto Amsterdam Jersey Luxembourg New York Dublin Limerick Stockholm Bangalore Beijing Hong Kong Melbourne A network of offices Singapore in 18 States and Tokyo Washington D.C. 5 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 6. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 6 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 7. Determining the Requirements Focus on what matters to clients, not on technology.  Relationship managers want latest mobile technology but need:  All data necessary to conduct meeting  Minimal distractions  Ability to work anywhere the client is located Having “zero  bars”  shouldn’t  hinder  the  conversation! 7 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 8. Business Requirements Need to avoid this situation…. WELCOME - Today’s Agenda  9am – 9:05am Attempt to connect to available Wi-Fi with incorrect settings  9:05am – 9:15am Give up and struggle with slow 3G connection  9:15am – 9:20am Locate presentation materials with assistance from help desk  9:20am – 9:30am Diagnose problems with projector and screen  9:30am – 10am Finally… Discuss client’s financial goals 8 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 9. Technology Requirements The two primary technology requirements...  Disconnected mode  Maximize time with client No connections to establish. No interruptions caused by poor reception, network outage, etc.  Quick Highly responsive user interface by minimizing server requests. Not relying on slow connections to transfer large documents during meetings.  Reach Client meeting location not bounded by reach of antennas. Want to accompany the client on their yacht? – No problem.  Security  Highly sensitive client data being stored.  Mobile device more susceptible to loss and theft.  Primarily using untrusted networks. 9 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 10. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 10 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 11. Architectural Choices “Got the requirements, let’s build a mobile app!” ...not so fast.  Need to establish formal guidance for building mobile solutions at Northern Trust with help from vendors, consultants and peers.  The result: Northern Trust Mobile Strategy and Reference Architecture Strategy contains guidance for management: • Definition of mobile apps, devices and content • Governance recommendations • Usage Policies • Risks • Etc. Architecture contains developer guidance: • Style of app: web, native, or hybrid • Security • Device support • Service development • Etc. 11 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 12. Architectural Choices First major decision…web, native or hybrid*? Web/Hybrid Native * Defined as a thin native wrapper around a primarily HTML/JS view. Hybrid apps fall within a spectrum between web and native depending upon how many native features are utilized. 12 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 13. Architectural Choices Decision: Native Application Architecture 1) Secure offline operation Secure local storage “Why  not  HTML5  local  storage?” Size restrictions (app is a storage hog!) Reliability – browser cache easily erased Security concerns 2) Superior presentation Better appearance Greater app awareness 3) Performance Fewer round-trips to server Quicker rendering 13 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 14. Architectural Choices BUT: Typically don’t recommend native at Northern Trust  Web or hybrid apps are preferred because: Cheaper to build with in-house web expertise Majority of effort is reusable Can be indistinguishable from native with HTML5/JavaScript Quicker to deliver new features 14 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 15. Architectural Choices Gartner, 2012 15 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 16. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 16 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 17. Infrastructure 1. User places documents in folder on internal portal 2. Synchronization initiated by user from iOS app while online 3. Middleware sends updates back and forth between mobile app and source systems. 17 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 18. Infrastructure Decision: iOS Platform Only  Internal application. Control of device choice  Users more familiar with Apple products. Less training.  Fewer platform specific updates. 2012 Market share Apple Android Microsoft Other http://www.gartner.com/it/page.jsp?id=1980115 18 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 19. Infrastructure Decision: Vended service gateway  Layer 7 is edge security for external services  Integration with authentication providers  Speaks multiple security protocols  Custom solution added no value http://www.gartner.com/technology/reprints.do?id=1-17Q04QM&ct=111019&st=sg 19 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 20. Infrastructure Decision: ReST over SOAP  Lightweight - important for mobile  Heavier SOAP difficult to handle on mobile client.  Mobile clients have APIs for handling basic URL calls  Poor web service support in iOS/Android unlike in Java or .NET 20 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 21. Infrastructure Decision: Custom Middleware  Purpose – Extract data from source systems, feed to mobile client apps  Why Custom? Anticipated consolidation within market for mobile middleware (MEAP) Cloud based solution not acceptable for use case Custom source system integration 21 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 22. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 22 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 23. Security Decision: Plan for the worst with numerous security layers Over the wire OAuth 2.0 Popular standard for cloud APIs Open to federation in future with 3rd parties Easy to use with ReST services Two-factor Access token required due to sensitivity of data RSA SecurID Software Token + iOS SDK chosen for limited user involvement Better user experience, but still as secure as physical token 23 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 24. Security On device Mobile Device Management (MDM) Passcode requirement Remote data wipe Local Authentication Support offline identification of users Future SSO with all Northern Trust applications Local Encryption Secure whether online or off Strongest available algorithms Double security – iOS platform and custom 24 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 25. Summary Listen to your clients Define your Strategy Design for Resilience Go Web by default Buy a Gateway Caution: Middleware Security: Plan for a worst case 25 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 26. Questions? Thank you for attending! 26 “Beyond the Wireless Tether” - Gartner Catalyst 2012