Monday, December 3, 2012

"Secure Integration in a Box"... literally!


The way the Business innovates has shifted
Many businesses today are innovating by providing their customers with new ways to conduct business. This is a significant shift from how businesses used to run -- being directed from the enterprise out, with controlled applications, business processes, and information. Now those barriers are dissolving and technology has connected and empowered a new set of external stakeholders: customers, partners and even external app developers who demand a collaborative dialog with the business, while expecting highly secure access to their own information. The importance of technology to the business agenda continues to increase in priority, and IT needs to be able to respond quickly to these business needs by leveraging new capabilities like cloud, mobile and social computing for business advantage.

New workloads must be supported
Enterprises need a technology platform that can address the escalating demands of new workloads (mobile, APIs, cloud), as well as core traditional ones (batch, web applications, transaction processing) all while also addressing security. You must be able to adapt to the workload styles dictated by new technology and market trends. The core workloads like OLTP, batch processing, and web applications must interact with mobile apps, API services, and social conversations. But how can you make the change to your infrastructure to support all of the workload requirements?

Mobile creates new security and integration issues
Building and connecting mobile apps has become essential as the business focus has shifted to the mobile enterprise space – both for employees using mobile as a productivity tool and for customers/partners using mobile to conduct real business. While mobile presents great opportunity, it also presents some unique challenges around security and integration. Most legacy applications were not built to handle the new challenges of mobile security. Sophisticated, targeted attacks designed to gain continuous access to critical information are increasing
in severity and occurrence. (For details on increased threats, see the IBM X-Force 2012 Trend & Risk Report) For example, XML security threats are growing. Securing employee-owned devices and connectivity to corporate applications are top of mind to CIOs as they broaden support for mobility. Regulatory and compliance pressures are mounting as companies store more data and can become susceptible to audit failures. Cloud security is a key concern as customers rethink how IT resources are designed, deployed and consumed. How can you secure access to enterprise resources from these growing threats?

Characteristics of the ideal solution for IT ‘s needs
IT organizations are under tremendous pressure to reduce costs and do more with less, all while responding to business demands. The ideal solution would address:
  • Built-in Security for web apps, mobile, APIs, B2B and web services for both XML and non-XML traffic
  • Workload Optimization by enabling self-balancing, providing dynamic load distribution to backend enterprise resources, and providing the option to cache certain types of data
  • Superior performance to respond to growing workloads
  • Industry standards support
  • Flexible integration with backend services and data, shielding business applications from security requirements, protocol changes and service versioning
  • Runtime SOA Governance to enforce different types of policies including Authorization Security and Service Level Agreements
  • Reduced total cost of ownership (TCO) both for operational and development costs, with a minimal infrastructure footprint
  • Simplified maintenance decreasing the time required to upgrade the environment

Assessing solutions from 4 key players in the market
There are a few technology vendors that provide a single drop-in solution in a physical appliance form-factor to address some or all of these requirements. But how does one choose the best solution? To help you decide, Lustratus Research has assessed four leading vendor solutions in this space. Read their findings in “A Competitive Review of SOA Appliances.”
 

Thursday, February 9, 2012

Remember how we used to set alarm clocks at a fixed time? And browse web sites? Remember?

Everyone is familiar with pointing their web browser at a web site that is powered by several web servers so that they can locate information, data, go shopping, banking, do social media stuff, etc. 

Imagine, in the future you will be able to point your browser at a person and get information about the person including health status – blood pressure, heart rate. Or point at a house and get the status of devices in the home from the security system, heating and media and just as important will be able to control them.  The Internet of Things goes beyond this, it will not just be people interacting with devices but the devices interacting with each other. 
 
Imagine an intelligent alarm clock that looks at your calendar and understands where you need to travel to first thing the next day, it monitors traffic and weather conditions and wakes you up at the right time to ensure you get to you first appointment on time.

Imagine devices that consume a lot of energy, listening for changes in the price of energy and turning on when the rate is cheap and off when the price goes up enabling efficient use of the grid.

Imagine emergency services drawing up at a building that is on fire and using an augmented reality display to determine where hazardous chemicals are located on site, where people are located and what their health condition is.

What will the world look like in 5 years time? It will be a lot more event-oriented. With the proliferation of devices the internet will evolve.

To connect smart devices with each other to the enterprise, you would need a reliable but lightweight messaging protocol. Message Queue Telemetry Transport (MQTT) is an open message protocol that enables the transfer of telemetry-style data in the form of messages from pervasive devices, along high latency or constrained networks, to a server or small message broker. Pervasive devices may range from sensors and actuators, to mobile phones, embedded systems on vehicles, or laptops and full scale computers. This extremely lightweight publish/subscribe messaging transport is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.

Did you know that Facebook is using MQTT for their smartphone messaging app launched in late 2011. More details on that are here:
https://www.facebook.com/notes/facebook-engineering/building-facebook-messenger/10150259350998920

IBM's implementation of MQTT in WebSphere MQ allows for access to remote devices with your messaging infrastructure running on MQ. More details are here:  
http://www-01.ibm.com/software/integration/wmqfamily/telemetry/

The most exciting news is that MQTT is now taken to a standards body. For details on the submission to Eclipse of MQTT Java and C client code, see here:  

Every company, organization, city, nation, and natural systems like rivers and weather are becoming instrumented, interconnected and intelligent. This is leading to new savings and efficiency—and perhaps more importantly—new possibilities for progress. 

We live in such exciting times!