[Log In] []

Exploring the science and magic of Identity and Access Management
Thursday, October 29, 2020

#YJJ Architecture: Services in the Cloud

Yellow Jeep Journey, YJJ Architecture
Author: Mark Dixon
Wednesday, April 23, 2014
6:42 pm

On April 5th, I posted a high level architecture diagram of sensors, subsystem controllers, gateway and supporting functions that will need to exist on the Jeep.  Today’s post offers a high level diagram of functionality that should exist in the Yellow Jeep Cloud. This roughly follows the structure of the Oracle IoT Platform I described in my March 22nd post.

YJJCloud01

 

One basic design objective is that all functions will be exposed as secure API’s that could be consumed by web apps or mobile apps as needed.  Therefore, the primary interface to the open Internet is a secure API gateway.  This may operate in conjunction with an enterprise service bus that manages a catalog of available services and API’s.

For the purpose of this post, available services are divided into five major categories, with three major data repositories:

First, the data repositories:

Data Repository.  This is the database where all data from the Jeep (or many Jeeps) will be collected and stored for functional processing or analysis.

Device Repository.  This database will be used to maintain a complete catalog of all available and used devices, along with capabilities pertaining to each device.

User Directory.  This directory will be used to maintain all users, access rights and credentials necessary to access data services and applications in the YJJ cloud.

Now, the functional elements:

Functional Services.  These services are really the focal point of the YJJ cloud.  It is this functionality that will make the the data collected and used from the Jeeps used.  Some functions may be quite generic, such as data ingest, event processing and data analytics, but I anticipate that a set of #YJJ-specifc services (yet to be defined) will be the most important set of functions in this group.

Device Management.  A complete catalog of devices authorized to connect to the YJJ Cloud will need to be maintained, and secure access rules enforced.  Functions to discover, register and manage changes to this large network of devices will be required.

User Management.  All users that will access YJJ data, services, APIs or applications will need to be registered and access rights be appropriately granted.  

Access Management. Access Management or Control functionality will be needed to enforce security polity for application access by users as well as to secure the APIs that can be used by external applications for accessing YJJ functionality.

Administration Services.  Common administration services will be needed to monitor the health of system components and provide auditing and reporting functions.

This provides a very high level view of my thoughts for YJJ Cloud functionality.  Much more definition is needed for each set of services.  Stay tuned!

Roll on Yellow Jeep Journey!

 

Comments Off on #YJJ Architecture: Services in the Cloud . Permalink . Trackback URL
WordPress Tags:
 

#YJJ Architecture: Yellow Jeep Cloud

Yellow Jeep Journey, YJJ Architecture
Author: Mark Dixon
Thursday, March 13, 2014
5:23 pm

Yjjcloud

Having previously introduced my thoughts about Yellow Jeep Architecture Users and Instrumenting the Jeep  we can begin to explore what functionality should exist in the Yellow Jeep Cloud. Here are some functions I have considered:

Basic Yellow Jeep Cloud functions:

  • data ingest
  • data storage
  • event processing
  • historical analysis, trending
  • supervisory control functions
  • historical route mapping
  • authentication
  • authorization
  • user registration / profile management
  • user password/credential management
  • API security

Of course, in keeping with modern standards in the API Economy  cloud functions would all be exposed in the Yellow Jeep API, with capabilities such as these:

  • ingest data
  • ingest audio
  • ingest video
  • request raw data
  • request data summary
  • request calculated data
  • request supervisory control data
  • request video stream/segment
  • request audio stream/segment
  • authentication
  • authorization
  • user management

What functionality should I add?  What capabilities do you think should existing in the Yellow Jeep API?

Roll on Yellow Jeep Journey!

Comments Off on #YJJ Architecture: Yellow Jeep Cloud . Permalink . Trackback URL
WordPress Tags: , ,
 

Yellow Jeep Technology Convergence – Take 2

Yellow Jeep Journey
Author: Mark Dixon
Thursday, March 6, 2014
9:21 am

Recently, I posted a diagram illustrating the convergence of technology for the Yellow Jeep Journey  After further thought, I believe the following diagram is a bit more accurate.  By separating Social Media and other services from the Yellow Jeep cloud, we can focus on what functions should exist within the Yellow Jeep cloud and what services will used from other sources.

Cloud02

 

Roll on Yellow Jeep Journey!

Comments Off on Yellow Jeep Technology Convergence – Take 2 . Permalink . Trackback URL
WordPress Tags: , , , ,
 

Yellow Jeep Technology Convergence

Yellow Jeep Journey
Author: Mark Dixon
Tuesday, March 4, 2014
9:33 pm

Recently, I blogged about my interest in leveraging five major converging technologies (Identity, Internet of Things, Mobile, Social and Cloud) to transform my Yellow Jeep into a rolling laboratory, enabling me to experiment with and demonstrate how these important trends can enrich our lives.

This diagram will provide a framework for exploring my ideas:

Cloud01

The three big areas of exploration:

Instrumenting the Yellow Jeep – What sensors, actuators and control systems can be installed in the Yellow Jeep to monitor the vehicle, provide real time and historical data about its journeys and provide appropriate interaction with the driver and passengers?

Cloud functionality – What functions should exist in the cloud to receive and store data from the Yellow Jeep, provide appropriate supervisory control mechanisms and data analytics, and support user interface applications?

User Interface – What can users see and do via mobile or web applications to trace, interact with and analyze the Yellow Jeep and those who travel with me?

In the next few days, I’ll blog about my ideas in each of these areas.  If any of you would like to share your ideas, please let me know!

Roll on Yellow Jeep Journey!

 

Comments Off on Yellow Jeep Technology Convergence . Permalink . Trackback URL
WordPress Tags: , , , ,
 

#YellowJeepJourney: Identity, IoT, Mobile, Social and Cloud

Internet of Things, Yellow Jeep Journey
Author: Mark Dixon
Saturday, March 1, 2014
9:48 pm

I recently launched a personal web site and blog, Yellow Jeep Journey,  to provide a personal canvas where I can document my efforts to reach an aggressive weight loss goal, and more importantly, share my experiences in finding personal freedom, light, power and joy along the way.

But the Yellow Jeep Journey and Discovering Identity blogs are now coming together in an exciting way.  I am exploring how to more effectively integrate my professional pursuits into my quest for personal improvement.  I will cross-post my ideas about this pursuit on both blogs. I hope to garner the insight and support of my professional colleagues and associates as I move forward on this exciting endeavor.

So, here we go …

If you were to take the journey of your lifetime in a Yellow Jeep, how would you customize the Jeep for the journey?  Tires? Lift? Engine? Lights?  Yep – an integral part of the Jeep Mystique is modifying your own vehicle to suite your individual taste.

However, crazy engineer that I am, I have been thinking deeply about equipping my Yellow Jeep in a different way.  Of course, the tires and lift will be there, but I can envision more.  Suppose I could make my Yellow Jeep into a rolling laboratory of sorts, to test, play with and demonstrate the convergence of some of the most important technology trends in the world today? 

I have been heavily involved for the last decade in Identity and Access Management technology.  It has been a great ride, but I want to explore how to apply that technology in new and different ways.  Our world is experiencing great growth and innovation in the areas of cloud computing, mobile technology, social media and the most exciting to me – the Internet of Things. What if my Yellow Jeep could go beyond the traditional Jeep configuration and be equipped with the latest computing equipment and electronics that leverage and even break new ground in these converging forces?

Converge

Over the next several weeks, I will use this blog to record and refine my thoughts about how to leverage these technology trends to make my Yellow Jeep a powerful and exciting example of how these trends can all be leveraged together to enrich and enlighten our lives like never before.

Hope you will come along for the ride!

Roll on Yellow Jeep Journey!

Comments Off on #YellowJeepJourney: Identity, IoT, Mobile, Social and Cloud . Permalink . Trackback URL
WordPress Tags: , , , ,
 

KuppingerCole: Information Security Predictions and Recommendations 2014

Cloud Computing, Identity, Information Security, Internet of Things
Author: Mark Dixon
Thursday, December 19, 2013
2:53 pm

Kuppingercole

Kuppinger Cole just released an insightful Advisory Note: “Information Security Predictions and Recommendations 2014.”  The introduction stated:

Information Security is in constant flux. With the changing threat landscape, as well as a steary stream of new innovations, demand for Information Security solutions is both growing and re-focusing.

I like both the predictions and recommendations in this report.  Here are a few excerpts from my favorite recommendations:

Cloud IAM (Identity and Access Management)

Define an IAM strategy for dealing with all types of users, devices, and deployment models that integrates new Cloud IAM solutions and existing on-premise IAM seamlessly.

API Economy

Before entering this brave, new world of the API “Economy”, define your security concept first and invest in API Security solutions. Security can’t be an afterthought in this critical area.

IoEE (Internet of Everything and Everyone)

Before starting with IoEE, start with IoEE security. IoEE requires new security concepts, beyond traditional and limited approaches.

Ubiquitous Encryption

Encryption only helps when it is done consistently, without leaving severe gaps.

The whole paper is well worth reading.  Hopefully, this post whetted your appetite a little bit.

Comments Off on KuppingerCole: Information Security Predictions and Recommendations 2014 . Permalink . Trackback URL
WordPress Tags: , , , , , ,
 

Gartner: The Nexus of Forces – Social, Mobile, Cloud and Information

Identity
Author: Mark Dixon
Wednesday, May 15, 2013
3:58 pm

GartnerNexus

Today I read a year-old document published by Gartner, entitled, “The Nexus of Forces: Social, Mobile, Cloud and Information.”  It explains the interaction among these market forces better than any single document I have read:

Research over the past several years has identified the independent evolution of four powerful forces: social, mobile, cloud and information. As a result of consumerization and the ubiquity of connected smart devices, people’s behavior has caused a convergence of these forces.

In the Nexus of Forces, information is the context for delivering enhanced social and mobile experiences. Mobile devices are a platform for effective social networking and new ways of work. Social links people to their work and each other in new and unexpected ways. Cloud enables delivery of information and functionality to users and systems. The forces of the Nexus are intertwined to create a user-driven ecosystem of modern computing. (my emphasis added)

Excerpts from Gartner’s treatment of each of these areas include:

Social

Social is one of the most compelling examples of how consumerization drives enterprise IT practices. It’s hard to think of an activity that is more personal than sharing comments, links and recommendations with friends. Nonetheless, enterprises were quick to see the potential benefits. Comments and recommendations don’t have to be among friends about last night’s game or which shoes to buy; they can also be among colleagues about progress of a project or which supplier provides good value. Consumer vendors were even quicker to see the influence — for good or ill — of friends sharing recommendations on what to buy.

Mobile

Mobile computing is forcing the biggest change to the way people live since the automobile. And like the automotive revolution, there are many secondary impacts. It changes where people can work. It changes how they spend their day. Mass adoption forces new infrastructure. It spawns new businesses. And it threatens the status quo.

Cloud

Cloud computing represents the glue for all the forces of the Nexus. It is the model for delivery of whatever computing resources are needed and for activities that grow out of such delivery. Without cloud computing, social interactions would have no place to happen at scale, mobile access would fail to be able to connect to a wide variety of data and functions, and information would be still stuck inside internal systems.

Information

Developing a discipline of innovation through information enables organizations to respond to environmental, customer, employee or product changes as they occur. It will enable companies to leap ahead of their competition in operational or business performance.

Gartner’s conclusion offers this challenge:

The combination of pervasive mobility, near-ubiquitous connectivity, industrial compute services, and information access decreases the gap between idea and action. To take advantage of the Nexus of Forces and respond effectively, organizations must face the challenges of modernizing their systems, skills and mind-sets. Organizations that ignore the Nexus of Forces will be displaced by those that can move into the opportunity space more quickly — and the pace is accelerating.

So, what does this mean for Identity and Access Management?  Just a few thoughts:

  1. While “Social Identity” and “Enterprise Identity” are often now considered separately, I expect that there will be a convergence, or at least a close interoperation of, the two areas. The boundaries between work and personal life are being eroded, with work becoming more of an activity and less of a place.  The challenge of enabling and protecting the convergence of social and enterprise identities has huge security and privacy implications. 
  2. We cannot just focus on solving the IAM challenges of premised-based systems.  IAM strategies must accommodate cloud-based and premise-based systems as an integrated whole.  Addressing one without the other ignores the reality of the modern information landscape.
  3. Mobile devices, not desktop systems, comprise the new majority of user information tools. IAM systems must address the fact that a person may have multiple devices and provide uniform means for addressing things like authentication, authorization, entitlement provisioning, etc. for use across a wide variety of devices.
  4. We must improve our abilities to leverage the use of the huge amounts of information generated by mobile/social/cloud platforms, while protecting the privacy of users and the intellectual property rights of enterprises.
  5. Emerging new computing paradigms designed to accommodate these converging forces, such as personal clouds, will require built-in, scalable, secure IAM infrastructure.
  6. The Gartner Nexus doesn’t explicitly address the emergence of the Internet of Things, but IoT fits well within this overall structure.  The scope of IAM must expand to not only address the rapid growth of mobile computing devices, but the bigger virtual explosion of connected devices.

We live in an interesting time. The pace of technological and social change is accelerating. Wrestling with and resolving IAM challenges across this rapidly changing landscape is critical to efforts to not only cope with but leverage new opportunities caused by these transformative forces.

Comments Off on Gartner: The Nexus of Forces – Social, Mobile, Cloud and Information . Permalink . Trackback URL
WordPress Tags: , , , ,
 

Cloud’s Biggest Risks?

Identity
Author: Mark Dixon
Friday, July 20, 2012
9:14 am

The following excellent infographic produced by AMD Cloud Computing Research shows some interesting statistics about the adoption of cloud computing, based on AMD’s Global Cloud Computing Study.  I was interested to see that while 60% of respondents say they are currently using some form of cloud computing, 63% of respondents specified Security as the biggest risk.

Enjoy!

Cloud Computing

Comments Off on Cloud’s Biggest Risks? . Permalink . Trackback URL
WordPress Tags: ,
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.