Still VPN to your SaaS?

Faisal Jameel

Faisal Jameel

The popular myth that cloud environments are not secure has an opposing view which is almost as strong. Proponents of this view claim that mature cloud providers due to the economies of scale have the ability to offer the best in class security. If vendors were unable to provide secure solutions their reputation and hence their entire business would be at stake. So there is no need for cloud consumer to worry or invest in cloud security. The answer in fact lies somewhere in the middle. According to a recent Gartner article 1 through 2020, 95 percent of cloud security failures will be the consumer's fault. It is imperative for any organization embarking on the cloud journey to realize that cloud security is a shared responsibility between the cloud provider and cloud consumer, and that majority of the burden is actually on the consumer to secure their cloud applications. This article will try to describe three security techniques that are essential for any organization subscribing to a cloud service. Most organization will shift workloads to the cloud without a corresponding shift in security policies. Defining a detailed strategic policy upfront is often not possible; however, a happy medium is when some high level directives are available from the C-Lounge. Typical examples could be a pre-approved list of services deemed fit for the cloud or some guidance on which mission critical applications should NOT be moved to the cloud. In the absence of such direction organizations tend to use the tools of yesterday to implement solutions for tomorrow… a recipe for disaster. Take a look at the following example on how peer to peer connections are made over a WAN using TCP /IP. The basic system operation was highly scalable but wide open. Figure 1 – Basic TCP /IP system operation A host would find...


The Microservice Pattern

Paulo Merson

Paulo Merson

The SOA Design Patterns Catalog has been extended with the newly authored Microservice pattern. This pattern formalizes the Microservice deployment model and specifies its distinct characteristics, as well as its impacts and application, as they pertain to service-orientation and SOA. The pattern explains the vital relationship between its deployment model and the resulting support it provides for the application of the Service Autonomy principle. It further highlights the important performance and reliability benefits that can be gained through the separation and isolation of microservices from monolithic hosting environments.


IT Services for SMEs

Vinod Nair

Vinod Nair

In the business world most of the enterprise are governed by internet based intranet based or product based software entity for smooth functioning of their logistics (For example healthcare, transportation, retail, banking, manufacturing etc.). Even though every enterprise falls in to a common logistic, everyone bring forth own IT enabled system for their business. Still we know that there is a huge gap in small and medium sized enterprises (SMEs) business and well defined cost effective IT services. We know that most of these enterprises are functioning on similar logistics like retail, finance, manufacturing, agriculture, hospitality, banking etc. with varying inputs. At any time, in information technology also, most of the systems developed falls into these similar categories up to certain extend. Similar logistics are being automated for different enterprises by differed inputs and layouts. Here we can look for a major business opportunity. We can think of a scenario (A global service model in a secured network). It is quite natural to think so, since nowadays we can categorize vast number of identical businesses entities, they fall in to any of these common logistic and follow similar business rules. Here the scope for a project comes up. I call it as "Global Logistic Transaction Server (GLTS)". Scope of the document is to propose a new strategy for developing applications based on Service Oriented Architecture (SOA) to enable well- defined IT among Small and Medium Businesses (MSMEs) following SaaS model. The document intends to create an initiative on this regard. Any Company or group of companies following similar logistics with varying input are the clients here. We can provide them an internet or intranet based service by serving a Web server or a Component Server in a dedicated facility decided by the client, in a collaborative environment. Here we can...


Integration – The Blockchain 'Killer Usecase' – Part II

Benedikt Herudek

Benedikt Herudek

This is the second part of a two-part article series. The first part is published at Integration – The Blockchain 'Killer Usecase' – Part I. Here is the problem: standards are an issue, because they would need to be followed. The Bitcoin protocol – ironically enough, because it is a decentralization approach – has an extreme point of view, when it comes to standardizing and centralizing the language necessary to execute transactions and eventually store data. There is just nothing else then Bitcoin Blockchain. The wallets are 'mere slaves', who have no other local Data Store and no other way to talk about Bitcoin than how the Blockchain commands them. That works for some use cases like finance and potentially legal, but is this a scenario that could resonate with the enterprise application landscape? Certainly not, there is an abundance of Applications out there all with different ways of describing concepts and storing data and often these applications are just what a group of users once wanted. Stripping them of their Data Models and forcing their data into a Blockchain or even their application logic onto the Blockchain with a Turing complete language would make little sense for most of them. There is no need for the specifics of the Blockchain way of storing data and in many cases things might scale or just be over – engineered. Using Bitcoin Blockchain Integration Pattern as a general Integration approach is not a good idea, because it is too restrictive and would have most general purpose Applications suffocate. Just to be clear: no one ever said it would be a good idea to use a Bitcoin style Integration Approach as a general way to integrate Applications. We started out investigating, why the Bitcoin Blockchain is able to quickly integrate wallets and have them talk...


SOA, Cloud Computing & Big Data Certification Workshops
To view the most current calendar of public SOA, Cloud Computing & Big Data Science Certified Professional workshops, visit www.arcitura.com/workshops
Download This Issue
Download Full Service Technology Magazine PDF The entire Q1/2016 issue of the Service Technology Magazine is now available for download as a high-resolution PDF.
About the Editor

Thomas Erl Thomas Erl is a best-selling service technology author and the Series Editor of the Prentice Hall Service Technology Series from Thomas Erl with over 175,000 copies in print worldwide.