What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user request a particular IT service per specified
requirements defining capacity and quality levels, in response to this, the
requirements will then be delivered when specified in a service based
delivery methodology which is process aware and which allows auditing.
According to Thomas Erl, we can def... (more)
With the advent of Web 2.0 and onward, the rise of the terminology and
concept we call Cloud Computing, coupled with an increase in the manner
technologies are being used, not only by corporations but by individuals as
well, comes an increased drive to ensure that risk is managed, effective
security measures to protect identities are implemented, and efforts are
expended to ensure privacy is maintained.
A few years ago, in their quest to implement and maximize on the benefits of
Service-Oriented Architecture (SOA), researchers at Microsoft separated SOA
into four areas (1) viz.
Last week at the 7th International Cloud Expo in Santa Clara, I sat on a
panel discussing virtualization and the cloud. As a follow on to my
contribution, it is my intention to expand on the position of virtualization
and the cloud ecosystem.
It is generally accepted that the concept of cloud computing or, at least the
amalgamation of services that infer the cloud ecosystem, lends to the premise
of improvements in managing deployed services. This due to an assumed
increase in efficiencies resulting from the sharing of hardware resources at
one end of the spectrum.
According to ... (more)
As mentioned in Part 1 of this article, one of my functions is to research
current and up and coming solutions within the technology realm, particularly
that of distributed computing and cloud computing.
It is a strong possibility that malicious users will eventually identify and
exploit potential flaws within the cloud computing model. CSPs, in their
pursuit to secure market share may have underestimated the possibilities of
attack and misuse of their cloud resources by a malicious user or users.
The likelihood that the creation, storage, processing and distribution of
illicit ... (more)
Web-services research and protocol applications have been around and in use
for quite some time now. With the potential Capex and Opex savings
enterprises can potentially realise from utilizing a cloud computing service
model, there should also be added focus on ensuring that security is properly
implemented either in authentication or authorization.
Cloud Computing, with its foundation in the world of virtualization, can take
advantage of key aspects of web service implementations and security
practice; but only to a point. Web service policies are based on a static
model that ... (more)