|By Sean Rhody||
|March 18, 2005 12:00 AM EST||
Recently, Paris Hilton's cell phone was hacked, and all her contact information was released on the Internet. Although I wasn't important enough to rate a listing, many other celebrities were apparently flooded with phone calls after their private numbers became oh-so-public. While the incident didn't involve Web services, it certainly did involve security, or rather a failure of security. And once again, security itself is the focus of this month's issue.
Security has been a topic of this magazine almost since its inception - and we tend to get proposals regarding security on a year-round basis. Initially, when the number of Web services specifications could be counted on one hand, security was a huge concern, and a serious impediment for enterprise adoption of Web services (and rightfully so when the only security provided was SSL).
Over the past several years however, that situation has been remedied by a large number of standards, most of which have been implemented in some fashion. These include WS-Security and things like digital signatures. If you dig into the security area you will find there is actually a large number of things you can do to protect your Web service. Some are targeted at the message and some at authentication; some even look at the content by validating that the message is a valid request.
Part of the initial resistance to Web services revolved around the need for security, and that did make sense. Now however, when we have a plethora of standards for combating the deficiencies of the original specifications, it's possible to put the general concern that Web services cannot be secured to rest.
Companies can now concentrate on Web services and security from an opportunistic standpoint. Whereas previously IT professionals had to fight the battle of "Web services aren't secure," they can now point to the standards and tools and say, "How secure do you want them to be?"
The nice thing about the various Web services standards is twofold; they are layered, and you can choose whether or not to use many of them. The layered approach makes it easier to design and build Web services. Later, someone can decide how to secure those services, or how to deploy them, or manage them. Not having to decide at design time how to implement the various strategies (or even whether to implement them) is a key advantage in Web services usage. Naturally, it's not a new concept - the application server people use it all the time with their deployment descriptors.
Regardless of where the idea came from, the separation of layers is a very useful thing. Web services security needs to run the gamut from absolutely none necessary to absolutely paranoid, with most services falling in between. That's because Web services are an edge technology, and sometimes the edge must be protected, but sometimes you want to expose it.
There are some well-known Web services such as Google and Amazon, which need little in the way of security. It isn't important to the use of these services to establish identity, so applying SAML would be a needless overhead, and would likely reduce the number of users, rather than increase them. Many services are like this - more or less wide open because the information transferred is of value only to the user. The fact that I search for "books by Sean Rhody" is interesting only to Amazon, who processes the request, and to myself. Well, and to my legions of fans of course. The point though is that my identity is irrelevant and securing the service is fairly unimportant because what is transferred has value only between Amazon and me.
On the other hand, if I were transferring money between my checking account and my savings account, I would want very strong security. I'm not rich, but I want what money I have to stay mine. I also don't want anyone else knowing how much money I do have - I get enough solicitations as it is despite the Do Not Call act.
We now have the tools to secure Web services as needed, without choking the services that can be designed without the need for heavy-duty security. And that's comforting, especially when we see other services being hacked and phone numbers being distributed on the Internet. Oh, and Paris - why haven't you called back?
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Oct. 1, 2016 05:45 PM EDT Reads: 1,854
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 05:15 PM EDT Reads: 670
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Oct. 1, 2016 04:30 PM EDT Reads: 1,321
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Oct. 1, 2016 04:30 PM EDT Reads: 411
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your ...
Oct. 1, 2016 04:00 PM EDT Reads: 1,309
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Oct. 1, 2016 04:00 PM EDT Reads: 3,737
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Oct. 1, 2016 03:45 PM EDT Reads: 610
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Oct. 1, 2016 03:30 PM EDT Reads: 1,767
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Oct. 1, 2016 03:30 PM EDT Reads: 1,201
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Oct. 1, 2016 03:00 PM EDT Reads: 3,073
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 01:30 PM EDT Reads: 878
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Oct. 1, 2016 01:00 PM EDT Reads: 5,194
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Oct. 1, 2016 12:30 PM EDT Reads: 2,342
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Oct. 1, 2016 12:30 PM EDT Reads: 670
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 12:30 PM EDT Reads: 664
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Oct. 1, 2016 12:30 PM EDT Reads: 3,134
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 12:30 PM EDT Reads: 5,557
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Oct. 1, 2016 12:30 PM EDT Reads: 3,278
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Oct. 1, 2016 11:45 AM EDT Reads: 2,818
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Oct. 1, 2016 11:30 AM EDT Reads: 1,340