Policy-based SOA Will Enable Increased Business Value And Agility

One of my favorite Forrester survey statistics to quote about SOA is the proportion of service-oriented architecture (SOA) users that see how important SOA can be for changing their business. In our Enterprise And SMB Software Survey, North America And Europe, Q4 2008 (taken after the start of the current economic crisis), 38% of Global 2000 SOA adopters said they are using SOA for strategic business transformation. This is a very high level of business impact — and far more value than was ever credited to object-oriented or component-based development. Why is this important to note? Many think of SOA first as a technology for reuse, like objects and components, and miss the reality that SOA is much more about business design and flexibility. By missing the business perspective on SOA, they miss the fact that SOA is the foundation for a much broader shift in application architecture and its relationship to the design, monitoring, and optimization of business processes.

Read more

MIT's attack on EC2 an academic exercise

Chenxi WangVirtual infrastructure has become the backbone of cloud computing, particularly in the area of infrastructure-as-a-service. This is why the latest attack on EC2 demonstrated by MIT researchers garnered a fair amount of attention in the press.

This is an attack against virtual computing resources, not necessarily against EC2 per se. In fact, this attack can potentially work against any virtual infrastructure, private cloud included.

Does this mean that there is a security vulnerability within EC2? Yes.

Should you be concerned? Not really.

This is an example of a "side-channel" attack. For this attack to be feasible, certain conditions must be true a priori. These conditions include that the attacker has knowledge of when the victim virtual machines would be launched. Some of these conditions, though not entirely impossible, are on the impractical side. While the author concedes that it is possible that an espionage attack with high-valued stakes may very well undertake such a method, it is hardly a concern for run-of-the-mill computing tasks running in EC2.

Read more

Categories:

Mobile Devices Find A New Home

Chris Silva

Following my colleague Andrew Jaquith's eloquent post, I thought it fitting that I add a post about changes in coverage and how they'll affect me. Before I do, however, I want to lend my voice to wish Natalie all the best in her new endeavor, it will be fun to run into her on the "opposite side of the table" in briefings in the future, and I'm thrilled that I'll be able to maintain professional ties with Natalie as she moves into the next phase of her career.

So, what's going to change for me and my coverage at Forrester as a result of Natalie's move? Well, as some of you know due to some communication I had with you last week, as a result of coverage shifting around, I'm very happy to announce that I am taking over Enterprise Mobile Device research for the Infrastructure and Operations team at Forrester to provide Ben Gray with some bandwidth to take on some of Natalie's virtualization coverage, details of which I'll leave best shared by Ben.

What's in store for my research?

Read more

Your New Client Security Analyst

Andrew Jaquith

After seven years, my colleague Natalie Lambert is leaving Forrester. In the year that I have been at Forrester, she has been a good team-mate, sounding board for ideas, gleeful mischief-maker, and collaborator on shared research topics. I will miss her insights and energy, and I wish her the best as she begins her next adventure.

Read more

Your new client security analyst

Andrew Jaquith

After seven years, my colleague Natalie Lambert is leaving Forrester. In the year that I have been at Forrester, she has been a good team-mate, sounding board for ideas, gleeful mischief-maker, and collaborator on shared research topics. I will miss her insights and energy, and I wish her the best as she begins her next adventure.

Read more

Categories: