tag:blogger.com,1999:blog-111680062024-03-13T03:41:36.247-07:00Business SOAA Simple blog about Business SOA and generally about how to drive IT from a business perspective. All opinions are mine and should be taken with a pinch of salt etc etcSteve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.comBlogger586125tag:blogger.com,1999:blog-11168006.post-20869945106345335252020-09-17T08:31:00.007-07:002020-09-17T08:33:48.634-07:00Service Accounts suck - why data futures require end to end authentication. Can we all agree that "service" accounts suck from a security perspective. Those are the accounts that you set up so what system/service can talk to another one. Often this will be a database connection so the application uses one account (and thus one connection pool) to access the database. These service accounts are sometimes unique to a service or application, but Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-79199009224986084012020-08-27T11:00:00.002-07:002020-08-27T11:00:16.814-07:00Getting RocksDB working on Raspberry PI (Unsatisfied linker error when trying to run Kafka Streams) If you are here its probably because you've tried to get RocksDB working on a Raspberry PI and had the following exception:Exception in thread "main-broker-b066f428-2e48-4d73-91cd-aab782bd9c4c-StreamThread-1" java.lang.UnsatisfiedLinkError: /tmp/librocksdbjni7453541812184957798.so: /tmp/librocksdbjni7453541812184957798.so: cannot open shared object file: No such file or directory (Possible Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com2tag:blogger.com,1999:blog-11168006.post-47343677636661733232016-08-24T00:21:00.002-07:002016-08-24T00:22:56.393-07:00Why taking good holidays is good practice
Back when I was a fairly recent graduate I received one of the best pieces of advice I've ever received. The project was having some delivery pressures and I was seen as crucial to one of the key parts. As a result my manager was putting pressure on me to cancel my holiday (two weeks of Windsurfing bliss in the Med with friends) with a promise that the company would cover the costs. Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-20778810433008301382016-08-01T11:42:00.000-07:002016-08-01T11:42:13.326-07:00The ten commandments of IT projects
And lo a new project did start and there was much wailing and gnashing of teeth, for up on the board had been nailed ten commandments that the project must follow and the developers were sore afraid.
Thou shalt put everything in version control, yeah even the meeting minutes, presentations and "requirements documents that aren't even finished yet" for without control everything is chaos
Thou Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-78413562145478607812015-01-28T07:59:00.000-07:002015-01-28T07:59:00.453-07:00Making DevOps Business Driven - a service view
I've been doing a bit recently around DevOps and what I've been seeing is that companies that having been scaling DevOps tend to run into a problem: exactly what is a good boundary for a DevOps team? Now I've talked before about how Microservices are just SOA with a new logo, well there is an interesting piece about DevOps as well, its not actually a brand new thing. Its an evolution Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-53921000607340162722015-01-20T08:00:00.000-07:002015-01-20T08:00:06.665-07:00Big Data and the importance of Meta-Data
Data isn't really respected in businesses, you can see that because unlike other corporate assets there is rarely a decent corporate catalog that shows what exists and who has it. In the vast majority of companies there is more effort and automation put into tracking laptops than there is into cataloging and curating information.
Historically we've sort of been able to get away with this Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-88707356701788346632015-01-15T08:00:00.000-07:002015-01-15T08:00:05.451-07:00Security Big Data - Part 7 - a summary
Over six parts I've gone through a bit of a journey on what Big Data Security is all about.
Securing Big Data is about layers
Use the power of Big Data to secure Big Data
How maths and machine learning helps
Why its how you alert that matters
Why Information Security is part of Information Governance
Classifying Risk and the importance of Meta-Data
The fundamental point here is that Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-81813677196034618352015-01-13T08:00:00.000-07:002015-01-13T08:00:00.706-07:00Securing Big Data Part 6 - Classifying risk
So now your Information Governance groups consider Information Security to be important you have to then think about how they should be classifying the risk. Now there are docs out there on some of these which talk about frameworks. British Columbia's government has one for instance that talks about High, Medium and Low risk, but for me that really misses the point and over Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-85747224976959059012015-01-12T08:00:00.000-07:002015-01-12T08:00:03.177-07:00Securing Big Data Part 5 - your Big Data Security team
What does your security team look like today?
Or the IT equivalent, "the folks that say no". The point is that in most companies information security isn't actually something that is considered important. How do I know this? Well because basically most IT Security teams are the equivalent of the nightclub bouncers, they aren't the people who own the club, they aren't as Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com2tag:blogger.com,1999:blog-11168006.post-89421409992453443272015-01-09T08:00:00.000-07:002015-01-09T08:00:04.190-07:00Securing Big Data - Part 4 - Not crying Wolf.
In the first three parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data, then how maths and machine learning helps to identify what is reasonable and was is anomalous.
The Target Credit Card hack highlights this problem. Alerts were made, lights did flash. The problem was Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-64506684791680098382015-01-08T08:00:00.000-07:002015-01-08T08:00:00.142-07:00Securing Big Data - Part 3 - Security through Maths
In the first two parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data. The next part is "what do you do with all that data?". This is where Machine Learning and Mathematics comes in, in other words its about how you use Big Data analytics to secure Big Data.
What you want to do is build Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-4177287457409347492015-01-07T08:00:00.000-07:002015-01-07T08:00:00.936-07:00Securing Big Data - Part 2 - understanding the data required to secure it
In the first part of Securing Big Data I talked about the two different types of security. The traditional IT and ACL security that needs to be done to match traditional solutions with an RDBMS but that is pretty much where those systems stop in terms of security which means they don't address the real threats out there, which are to do with cyber attacks and social engineering. An Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com2tag:blogger.com,1999:blog-11168006.post-45083335779153749522015-01-06T08:00:00.000-07:002015-01-06T08:00:00.750-07:00Securing Big Data - Part 1
As Big Data and its technologies such as Hadoop head deeper into the enterprise so questions around compliance and security rear their heads.
The first interesting point in this is that it shows the approach to security that many of the Silicon Valley companies that use Hadoop at scale have taken, namely pretty little really. It isn't that protecting information has been seen as a Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-1831809704941770312014-10-14T08:30:00.000-07:002014-10-14T08:30:00.131-07:00Uber won't want drivers in the future
I'm an Uber user, its a great service outside of cities with decent public transport. But I have been thinking about where they will justify the $17bn valuation and give people a return on that $1.2bn investment. At the same time I've been following the autonomous car pieces with interest and I think there is a pretty clear way this can end, especially as Uber have already said they Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-68859320587685795152014-08-07T08:00:00.000-07:002014-08-07T08:00:02.265-07:00Whistler, Microsoft and how far cloud has come
In six years Microsoft has come from almost zero corporate knowledge about how cloud computing works to it being an integral part of their strategy. Sure back in early 2008 there were some pieces of Microsoft that knew about cloud but that really wasn't a corporate view it was what a very few people inside the company knew.
How do I know this? Well back in 2008 I was sitting on the top ofSteve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com2tag:blogger.com,1999:blog-11168006.post-22975514205223256512014-07-14T08:10:00.000-07:002014-07-14T08:10:00.362-07:00Big Data doom mongers need to look outside of the marketing department
In every change there are hype machines that over play and sages who call doom. Into the Big Data arena steps David Searls to proclaim that Big Data is a myth and simply hype which is set to burst in an article over at ZDNet.
But big data, he said, is nothing more than the myth that collecting vast amounts of data can help companies know customers better than those customers even know Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-84881273348844697602014-06-27T08:00:00.000-07:002014-06-27T08:00:05.362-07:00Open Source as religion - when the Bazaar becomes a Cathedral
The seminal book on Open Source development "Cathedral and the Bazaar" talks eloquently about the difference between commercial software development and open source development. In the past few years however there has been another shift, a shift where companies are actively releasing their technology into Open Source as a competitive differentiation. A claim of 'we are open' because Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com1tag:blogger.com,1999:blog-11168006.post-966655487665296242014-05-27T08:00:00.000-07:002014-05-27T08:00:00.540-07:00MDM isn't about data quality its about collaboration
I'm going to state a sacrilegious position for a moment: the quality of data isn't a primary goal in Master Data Management
Now before the perfectly correct 'Garbage In, Garbage Out' statement let me explain. Data Quality is certainly something that MDM can help with but its not actually the primary aim of MDM.
MDM is about enabling collaboration, collaboration is about the Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-83585887243807955912014-05-22T11:00:00.000-07:002014-05-22T11:00:02.177-07:00Lipstick on the iceberg - why the local view matters for IT evolution
There is a massive amount of IT hype that is focused on what people see, its about the agile delivery of interfaces, about reporting, visualisation and interactional models. If you could weight hype then it is quite clear that 95% of all IT is about this area. Its why we need development teams working hand-in-hand with the business, its why animations and visualisation are massively Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-42953403595698157882014-05-22T08:00:00.000-07:002014-05-22T08:00:04.699-07:00How to select a Hadoop distro - stop thinking about Hadoop
Scoop, Flume, PIG, Zookeeper. Do these mean anything to you? If they do then the odds are you are looking at Hadoop. The thing is that while that was cool a few years ago it really is time to face it that HDFS is a commodity, Map Reduce is interesting but not feasible for most users and the real question is how we turn all that raw data in HDFS into something we can actually Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-20792348849032450532014-04-24T11:27:00.003-07:002014-05-23T13:14:23.094-07:00Data Lakes will replace EDWs - a prediction
Over the last few years there has been a trend of increased spending on BI, and that trend isn't going away. The analyst predictions however have, understandably, been based on the mentality that the choice was between a traditional EDW/DW model or Hadoop. With the new 'Business Data Lake' type of hybrid approach its pretty clear that the shift is underway for all vendors to have a Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-61919346879109942422014-03-25T08:06:00.003-07:002014-03-25T08:06:44.334-07:00Microservices is SOD all within SOA
Microservices is a Service Oriented Delivery approach, all within a Service Oriented Architecture context.
(Long Title ;)
Ok so a few more updates since the last time I wrote about Microservices and I think its worth just updating as it really is heavily underlining why Microservices is a Service Oriented Delivery approach that absolutely can fit within a Service Oriented Architecture. Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com1tag:blogger.com,1999:blog-11168006.post-62541013194463351782014-03-18T08:05:00.002-07:002014-03-18T08:05:37.134-07:00Microservices is SOA, for those who know what SOA is.
Ok so its started a bit of debate on Twitter and now there have been emails, but in the spirit of openness I thought I'd better blog. Now its good that Martin has now added a side bar on SOA to his article on Microservices but that really makes it worse in many ways. I'll get to that at the end but first off lets explain why Microservices is just another SOA Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com5tag:blogger.com,1999:blog-11168006.post-84894132218268352662014-03-12T11:29:00.003-07:002014-03-12T11:29:32.055-07:00What is real-time? Depends on who you ask
"Real-time" its a word that gets thrown about a lot in IT and its worth documenting a few of the different ways it gets used
Hard Real-time
This is what Real-time Java was created to address (along with Soft Real-time) what is this? Easiest way to say it is that often in Hard Real-time environments the following statement is true
If it doesn't finish in X milliseconds then people Steve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com0tag:blogger.com,1999:blog-11168006.post-8617581699249997822014-03-11T11:00:00.000-07:002014-03-11T11:00:04.059-07:00Microservices - Money for old rope or re-badging SOA for the cool kids
Hat tip to John Evedemon for the heads up on this one. Martin Fowler is peddling a new approach, 'Microservices' which... wait for it is a way of developing applications as a suite of services. Each one of which has its own process thread and 'communicates via lightweight mechanisms' such as.... over HTTP.
But wait there is more, you'll be stunned to know that these services can beSteve Joneshttp://www.blogger.com/profile/18324989580856894788noreply@blogger.com4