The REST Shell Game
Anybody who has worked with WSDL-based Web Services knows that the loose coupling they promised was a challenge to achieve. One silver lining around this cloud big-vendor SOA was the
Anybody who has worked with WSDL-based Web Services knows that the loose coupling they promised was a challenge to achieve. One silver lining around this cloud big-vendor SOA was the
Anybody with even a vague understanding of Cloud Computing knows it comes in three basic flavors: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). If you press a general audience to
Encryption is our primary tool for providing data confidentiality, an essential requirement for many Cloud Computing applications. However, as I discussed in the previous blog post, encryption is not a
Can you use SSL to secure interactions with the Cloud? The answer: in part. Remember, the original intent for SSL (Secure Sockets Layer, now known as Transport Layer Security, or
In the dark ages of distributed computing, all we had were fixed application programming interfaces (APIs). Want to call a function or procedure on a server? Read the documentation for
In The Code Reuse Paradox , I illustrated some problems with writing reusable code: developers must know which code to generalize, how far to generalize it, and how to tell
Reusability has been one of the holy grails of programming since the dawn of digital computing. Instead of writing some code that does exactly what today’s requirements specify and no
We’ve grown complacent. Cyberattacks are so common, so ubiquitous, that we’ve grown inured to them. Phishing attacks clog our inboxes. Denial of Service attacks pepper our financial system. And attacks
Private Cloud Adoption. Scene 1, Take 1. Action! Business Exec — “Public Clouds are too risky! They scare me. We need to build ourselves a Private Cloud.” IT Manager —