Welcome!

Reliable and Secure Gateways to the Cloud via XML and SOA Governance

Mamoon Yunus

Subscribe to Mamoon Yunus: eMailAlertsEmail Alerts
Get Mamoon Yunus via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Mamoon Yunus

Health Care at Cloud Expo We all know that technology is key to reducing health care costs, eliminating dangerous errors, and eventually providing coverage for all.  I like learning from others, so while we consider ourselves innovative, there is no point in repeating mistakes made by others.  Here's a fact motivating the Dutch -- one of the leading nations in using modern technology (SOA, XML. HL7v3, Schematrons, Virtualization, Cloud computing) for solving their heath care problems: "Currently some 90.000 people (out of a population of 16 million) are hospitalized yearly due to wrong medication."  Fourth Grade Math shows that we, in the US, may be hospitalizing (300/16 x 90,000) over 1.6 Million individuals due to wrong medication. A review of the Dutch Health Care Initiative that has evolved for almost a decade shows that they are on the leading edge of deploying... (more)

Why is a Cloud Gateway Required?

Gateway Sessions at Cloud Expo Security has been on the forefront of discussion in the technology community as being the primary concern gating enterprise adoption of cloud computing. Although this is a valid concern, most cloud providers, owing to the security demands of maintaining a multi-tenant infrastructure, provide strong security provisions, perhaps better than an enterprise's own data center. Legal, compliance and process issues become more significant rather than technical security concerns. Moving into 2010, reliability will be a higher concern for enterprises. Recent ou... (more)

Strategies for Securing Enterprise-to-Cloud Communication

The Cloud Security Alliance (CSA) published Version 2.1 of its Guidance for Critical Areas of Focus in Cloud Computing with a significant and comprehensive set of recommendations that enterprises should incorporate within their security best practices if they are to use cloud computing in a meaningful way. The Guidance provides broad recommendations for operational security concerns including application security, encryption & key management, and identity & access management. In this article, we will consider security implications of REST- and SOAP-based communication between co... (more)

Using SQL Azure for SOA Quality Testing

I. INTRODUCTION Throwing its hat in the Platform as a Service (PaaS) ring, Microsoft has joined the likes for Salesforce.com and Google with its annoucement of Microsoft Azure Platform. Microsoft Windows Azure Platform provides three primary components: Windows Azure: A cloud services operating system that serves as the development, service hosting and service management environment for the Windows Azure platform. SQL Azure: A cloud hosted relational database that removes the burdens of RDBMS installation, patching, upgrades and overall software management for relational databas... (more)

"Swamp Computing" a.k.a. Cloud Computing

Secure Cloud Computing on Ulitzer Security in the Ether, by David Talbot MIT Technology review recently published a great article titled: Security in the Ether addressing security, privacy and reliability issues resulting from cloud computing. Some of the interesting points in this article include: The cloud security threat is across two related dimensions: i) cloud resident data may be lost due to equipment/software failure or stolen by a hacker because of the shared resouce nature of cloud computing and ii) cloud data may be mishandled by the cloud provider because of technology... (more)