1. 2 mike giovinazzo director, esd government on-line: the view from ground zero ecc symposium 2001
TRANSCRIPT
1
2
Mike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESD
Government On-Line: Government On-Line: The view from Ground ZeroThe view from Ground Zero
ECC Symposium 2001ECC Symposium 2001
3
Government FocusGovernment Focus
“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”
“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”
Government On-line Initiative Government On-line Initiative Government On-line Initiative Government On-line Initiative
4
Government On-line: ObjectivesGovernment On-line: Objectives
Improve services to Canadians
Increased Efficiency and cost reduction
Create a government for 21st Century
Serve as catalyst for EC
Improve services to Canadians
Increased Efficiency and cost reduction
Create a government for 21st Century
Serve as catalyst for EC
5
World Wide OpportunityWorld Wide Opportunity
While The US grows at compound rates the rest of the
world will grow even faster. This
spells great opportunity for Canadian firms.
While The US grows at compound rates the rest of the
world will grow even faster. This
spells great opportunity for Canadian firms.
6
Adoption Hype CycleAdoption Hype Cycle
7
Observations & ChallengesObservations & ChallengesObservations & ChallengesObservations & Challenges
Early adopters / Pathfinders Early adopters / Pathfinders
8
Major ThemesMajor Themes
Security Privacy Common Look & Feel Anticipating Complexity Legacy Integration Challenges Managing Expectations Business Reengineering & Policy Funding/Scheduling Limitations
Security Privacy Common Look & Feel Anticipating Complexity Legacy Integration Challenges Managing Expectations Business Reengineering & Policy Funding/Scheduling Limitations
9
SecuritySecurity
TRUST - The cornerstone of security TRUST - The cornerstone of security TRUST - The cornerstone of security TRUST - The cornerstone of security
10
SecuritySecurity
Many assume PKI is the answer, but ... Many assume PKI is the answer, but ...
11
SecuritySecurity
PKI is mostly policy not technology
Select your goal(s): Encryption(Confidentiality), Data Integrity, Authentication, Non-repudiation
PKI is mostly policy not technology
Select your goal(s): Encryption(Confidentiality), Data Integrity, Authentication, Non-repudiation
12
What Level of Security ?What Level of Security ?
13
Mutli-channel considerationsMutli-channel considerations
Different access
channels have different authentication requirements
14
Personalization Vs PrivacyPersonalization Vs Privacy
15
Coping with Privacy Coping with Privacy
Horizontal Integration Is privacy in conflict with validation
e.g. “confirm sin ### ### ### = NAME” For a student loan ...
how to confirm you are a single parent
Vertical Integration Data exchange with provinces or
private enterprise
Horizontal Integration Is privacy in conflict with validation
e.g. “confirm sin ### ### ### = NAME” For a student loan ...
how to confirm you are a single parent
Vertical Integration Data exchange with provinces or
private enterprise
16
“common look and feel”“common look and feel”
Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users
sacrifices too much screen real-estate(copyright, federal identity, …)
strict standards (search engine, resolution, frames, accessibility ...)
“Application” focused standards under development
Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users
sacrifices too much screen real-estate(copyright, federal identity, …)
strict standards (search engine, resolution, frames, accessibility ...)
“Application” focused standards under development
17
“common look and feel”“common look and feel”
"Too often in the past, government services were "Too often in the past, government services were designed from the "inside out"; they reflected the designed from the "inside out"; they reflected the
structures of government organizations more structures of government organizations more than the needs and priorities of citizens. …than the needs and priorities of citizens. …
We cannot stop until We cannot stop until allall Canadians can have Canadians can have seamless access to seamless access to allall government services government services
quickly, simply and with a minimum of fuss".quickly, simply and with a minimum of fuss".
Privy Council Seventh Annual Report to The P.M.
18
4.
Supply Line Integration
3.Legacy
Integration
Evolution of Web Presence Evolution of Web Presence
2.
Limited Web Transactions Complexity
Val
ue
1. Web Site
19
Managing ComplexityManaging Complexity
Browser
Servlet Container
EJB Container
Application Servers
Relational Database
O/R Mapping
Graphic Artist
Server-Side Developer
Client-Side Developer
20
Managing ComplexityManaging Complexity
Application Services
JTA
Data Access Engine (DAE)
Database Drivers
Transaction Manager Encina
Event Log
Email Support
Synchronizer
State/Session
Conn. Pooling
Streaming
Result Cache
Security (ACL)
Directory Service (LDAP)
Web Connectors NSAPI, ISAPI, CGI
Encryption Plug In Load Balancer Plug In
Application LogicProcessing
HTML, JSP, Servlets
Presentation Layer
EJB JDBC, JTA
Data Access
C/C++
Business Layer
Request Manager Queue Manager
Tread Manager RequestSecurity Manager
Request ManagementSystem
Load Monitor Load BalancerLoad Balancing System
Protocol ManagerHTTP
CGI NSAPI ISAPI NASProtocol
IIOPOCLService A
dministrative S
ervices & S
NM
P Integration
21
Simplified FrameworkSimplified Framework
Internet Access
Back-end Systems
Interface Services
Application Services
Infrastructure SecurityServices
Presentation Services
Client Security
Planetworks Interspace
Visual Age for Smalltalk, Coldfusion, Metro, Edify, Silverstream and MS Transaction Server
Borderware Firewall and Checkpoint Firewall
Netscape Server, Microsoft IIS, Oracle Webserver, Visual Age for Smalltalk, Coldfusion, Metro, Edify & Silverstream and Apache Web Server
Entrust Suite, Secure ID and Gradient NetCrusader
Netscape Browser, MS Internet Explorer and all access methods
CICS, DB2, Oracle
22
Internet Access
Application Services
Presentation Services
Internet Access
Application Services
Infrastructure SecurityServices
Presentation Services
Client Security
Internet Access
Back-end Systems
Interface Services
Application Services
Infrastructure SecurityServices
Presentation Services
Client Security
Levels of Complexity Levels of Complexity
23
Managing Expectations Managing Expectations
Internally Secure channel’s role/capability We expect everyone to access our site
ExternallyPublic wants 7/24new medium means new service levelschoice of channel
“digital divide” means more $ not less
“single window”
Internally Secure channel’s role/capability We expect everyone to access our site
ExternallyPublic wants 7/24new medium means new service levelschoice of channel
“digital divide” means more $ not less
“single window”
24
Business Re-engineering & PolicyBusiness Re-engineering & Policy
In self service applications Who takes responsibility for data
accuracy ? What is the impact of system
unavailability ?
Policy vs Organisational Efficiency
In self service applications Who takes responsibility for data
accuracy ? What is the impact of system
unavailability ?
Policy vs Organisational Efficiency
25
TrainingTraining
Object-Oriented techniques
Component based architectures
Stateless processing
GUI design
Object-Oriented techniques
Component based architectures
Stateless processing
GUI design
Formal SDLC / methodologies
Configuration Management
Batch processing Legacy Integration
Formal SDLC / methodologies
Configuration Management
Batch processing Legacy Integration
26
Funding / Scheduling LimitationsFunding / Scheduling Limitations
Cost of PKI and CA Recently funded centrally
153 submissions for funding (July 31, 2000)
Total request funds $235 Million
27 pathfinders funded (approx. $60 Million)
Timelines are set but infrastructure like Secure Channel is not ready
Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004
Cost of PKI and CA Recently funded centrally
153 submissions for funding (July 31, 2000)
Total request funds $235 Million
27 pathfinders funded (approx. $60 Million)
Timelines are set but infrastructure like Secure Channel is not ready
Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004
27
Any Questions ?Any Questions ?Thank YouThank You
28