> Archive > Issue LXXXII, March 2014

Download Issue
Download Full Service Technology Magazine PDF

Cloud Computing and SOA

Jürgen Kress, Berthold Maier, Hajo Normann, Danilo Schmiedel, Guido Schmutz, Bernd Trops, Clemens Utschig-Utschig, Torsten Winterberg

Jürgen Kress Berthold Maier Hajo Normann
Danilo Schmiedel Guido Schmutz Bernd Trops Clemens Utschig-Utschig Torsten Winterberg

Why is everyone talking about cloud computing? Drawn-out, expensive IT projects that are planned and implemented without any benefits for the business stakeholders are commonplace. In contrast, cloud computing offers business users the chance to immediately implement services with usage-based billing that are tailored to their requirements, often without the need to consult with the IT department. However, aspects like security, architecture, availability, and standards are often not evaluated. Cloud consumers find themselves at the mercy of the cloud provider. Scenarios that require changing cloud providers after a cloud provider goes bankrupt, and the associated moving of data and/or applications, have not yet been sufficiently tested. Business continuity should play a key role from the start of a cloud evaluation process. One of the greatest challenges here is the integration of existing data and systems into the cloud solution. Without integration spanning between clouds and on-premise systems, processes can only be executed in isolation, leading to cloud-specific silos of isolated solutions. Important information for users is not available across processes and systems. Problems that would have occurred in the company's internal IT are now shifted to the cloud provider. To prevent "legacy clouds" or solutions that are hard to maintain, it is important to manage the entire architecture proactively and, in particular, the integration into the cloud. Even if cloud providers want us to believe otherwise, not every aspect of IT can be outsourced to cloud solutions! Cloud computing is a model for usage-based network access to a common pool of configurable computing resources (e.g. networks, servers, storage systems, applications, and services) that can be provided and used quickly. IP-based services...

Cloud and Virtual Data Storage Networking:
Being Secure Without Being Scared

Greg Schulz

Greg Schulz

Securing data infrastructure resources in cloud, virtual, networked, and storage environments presents a number of risks and security challenges. Security actions must cover physical security, logical security, multitenancy, and deciphering encryption. Measures must also be taken to eliminate blind spots, or "dark territory." Network storage security environments are unique to individual network needs and should be designed to protect data without inhibiting productivity. This article details techniques, technologies, and best practices that can be used to secure information resources most efficiently. Included is a security checklist providing basic items pertaining to storage and network storage security. This chapter looks at securing data infrastructure resources in cloud, virtual, networked, and storage environments to counter various internal and external threat risks and other security-related challenges. A good defense—having multiple layers, rings, or lines of protection—along with a strong offense of proactive policies combine to enable productivity while protecting resources. Key themes addressed in this chapter include securing data during transit as well as at rest, authorization, authentication, and physical security. There are many security challenges for protecting cloud, virtual, and data storage networks without impeding productivity. With the right techniques, technologies, and best practices, however, information resources can be effectively secured. As IT moves farther from the relatively safe and secure confines of data center glasshouses and internal physical networks with interfaces for Wi-Fi mobile and Internet computing, security has become even more important than it was in the past. Cloud, virtual machine (VM), and storage networking with remote access enable flexible access of IT resources by support staff, users, and clients on a local and wide area basis. This flexibility, however, also exposes information resources and data to security threats. This means that any desired increased accessibility must be balanced between data protection and busines...

Envisioning Converged Service Delivery
Platforms (SDP 2.0) - Part II

Pethuru Cheliah

Pethuru Cheliah

Service developers, providers and operators have been facing a critical challenge for a long time. That is, how quickly newer services can be created and delivered to customers. Achieving this goal has become a top priority for worldwide service providers as it is bound to create fresh avenues and revenues for enterprises. As widely known, the enterprise challenge is to do more with less. The straightforward method is to establish the goal of convergence as executives are striving hard and stretching further to substantially decrement the recurring IT development, infrastructure and operational costs. The much-needed convergence is happening in different layers and levels as explained below. A set of common services (service registry repository and directory) facilitates cost reduction while performing and providing services to their customers in double quick time. Voice/Data/Content Convergence - The service revolution is sweeping the entire world. Novel services are being introduced at a very rapid rate. This is to keep their customers happy and to offset the damages of their competitors. Rather than creating services from the ground up (this is a time-consuming process), internally available services and services from third-parties can be quickly identified, and smartly combined to generate premium and path-breaking services to reward and retain the customer base. With the availability wireless broadband communication technologies and infrastructures, video services are becoming popular and pervasive. Video services are being seamlessly integrated with voice and data services on need basis to craft multifaceted and mesmerizing services. Fixed/Mobile Convergence - Telecommunication service providers are offering converged fixed/mobile services ranging from simple bundled tariffs through sophisticated presence-based call processing to complex voice-over-broadband or voice-over-Wi-Fi roaming. In some cases, the entire service is provided by a single operator by leveraging multiple network technologies within a single service platform. On the other hand...

2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006