Solving the Digital Business Puzzle Using APIs and Microservices - Axway and
When organizations make the choice to put a digital platform in place, a
discussion on MicroServices is never far behind. By putting a MicroServices
layer in place, an organization creates the springboard to launch into the
digital future, whether that involves apps, rich Web clients, or IoT devices
such as in-store beacons. Individual MicroServices, or orchestrated groups of
MicroServices, serve as the foundation for this innovation. The data being
passed to and from MicroServices also serves as the basis for behavioral
analytics and Big Data, allowing organizations to tailor their digital
services based on their users. But what are MicroServices and how are they
To answer this question, I'm pleased to say that next week we're running a
webinar with Randy Heffner from Forr... (more)
This week's Time Magazine has a piece by Gaelle Faure entitled "How to Manage
Your Online Life When You're Dead" which describes what happens to online
profiles, Webmail, and social networking data when someone dies. Consider
Deathswitch, which is based in Houston, has a different system for releasing
the funeral instructions, love notes and "unspeakable secrets" it suggests
you store with your passwords and account info. The company will regularly
send you e‑mail prompts to verify that you're still alive, at a frequency
of your choosing. (Once a day? Once a year?... (more)
I saw this tweet this morning and I thought "+1" (I guess I am a geek if I am
thinking in Digg/Slashdot shorthand).
The problem is that in Information Security, "security" is all-too-often used
to mean only encryption. A line is considered "secure" if it's encrypted. But
often, the real "security" requirements are much broader and include
management (as in access management, identity management), business
continuity defense against denial-of-service, and privacy.
I think language is a big issue here. I've always found it interesting that
in German, the words for "security" and "ce... (more)
SOA in the Cloud on Ulitzer
Token translation using SAML is now quite an established way to allow
applications in one security domain to communicate with applications in
another security domain, on behalf of a user whole identity does not have to
also flow with the data. For more info go to Vordel's government page and
then click on "Secure Cross-Domain".
Can a similar architecture be used for SOA-to-Cloud and "inter-cloud"
scenarios? The answer is "yes - watch this space...."
SOA in the Cloud Expo
Randy Heffner from Forrester has posted on ZDNet about how "Policy-based SOA
will enable increased business value and agility". He does a great job of
explaining how a Policy-based SOA affects different users.
Firstly, there is the person designing the policy. As Randy says, the policy
is defined "using the SOA product’s administration tool" (ie. not by
writing code), and he goes on to say that "the important point here is that
the policy is declared separately from the service, allowing it to change
without changing the service itself".
So, the policy is de... (more)