Welcome!

Between Cloud, Mobility and the Enterprise is the API Middle Ground

Scott Morrison

Subscribe to Scott Morrison: eMailAlertsEmail Alerts
Get Scott Morrison via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Scott Morrison

SOA in the Cloud Expo I’ll be delivering a Webinar next week about Layer 7’s Enterprise Service Manager (ESM) product. ESM offers the global view of clusters of SecureSpan Gateways and the services under their management. It’s functions fall into three main areas: Enterprise-scale Management Centrally manage and monitor all Gateways and associated services across the extended enterprise and into the cloud Automated Policy Migration Centrally approve and then push policy to any Gateway across the enterprise, automatically resolving environmental discrepancies Disaster Recovery Remotely manage, troubleshoot, backup and restore all Gateways, supporting full disaster recovery ESM is an important tool for managing SOA in the Enterprise, but it also plays a critical role when SOA moves to the cloud. In addition to extending an organization’s visibility and control, ESM ... (more)

How Secure is Cloud Computing?

Cloud Expo on Ulitzer Technology Review has published an interview with cryptography pioneer Whitfield Diffie that is worth reading. I had the great pleasure of presenting to Whit down at the Sun campus. He is a great scientist and a gentleman. In this interview, Diffie–who is now a visiting professor at Royal Holloway, University of London–draws an interesting analogy between cloud computing and air travel: “Whitfield Diffie: The effect of the growing dependence on cloud computing is similar to that of our dependence on public transportation, particularly air transportation, wh... (more)

Visualizing the Boundaries of Control in the Cloud

Cloud Security Journal on Ulitzer Two weeks ago, I delivered a webinar about new security models in the cloud with Anne Thomas Manes from Burton Group. Anne had one slide in particular, borrowed from her colleague Dan Blum, which I liked so much I actually re-structured my own material around it. Let me share it with you: This graphic does the finest job I have seen of clearly articulating where the boundaries of control lie under the different models of cloud computing. Cloud, after all, is really about surrendering control: we delegate management of infrastructure, application... (more)

Cloud Security Alliance Identifies Top Cloud Security Threats

Security, Management & Compliance Track at Cloud Expo Register Today and Save $550 ! Explore Sponsorship Opportunities ! Today marks the beginning of RSA conference in San Francisco, and the Cloud Security Alliance (CSA) has been quick out of the gate with the release of its Top Threats to Cloud Computing Report. This peer-reviewed paper characterizes the top seven threats to cloud computing, offering examples and remediation steps. The seven threats identified by the CSA are: Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insider... (more)

Why Intermediaries Matter in SOA

Are SOA anti-principles more important than success principles? Last week Joe McKendrick >asked the question. The idea of anti-principles came from Steve Jones, who a few years back did some nice work documenting SOA anti-patterns. In a post published last fall, Steve builds on his ideas, observing: The problem is that there is another concept that is rarely listed, what are your anti-principles? which is one of those good questions that should give you pause. Steve continues: In the same way as Anti-Patterns give you pointers when its all gone wrong then Anti-Principles are the ... (more)