Henrik Hvid Jensen presents a SOA project meant to digitalize the registration of land property rights in Denmark, pointing to the architecture used, services and the registration process.
Thomas Bandholtz explains how Linked Data can be used to implement SOA in order to make datasets available throughout the enterprise, crosslink distributed datasets, and to master data management.
Herbjörn Wilhelmsen discusses the reasons why an SOA project failed while trying to reuse existing resources, and how it succeeded later starting from the same business case with reuse in mind.
Cesare Pautasso discusses the conceptual relationship between business processes and stateful RESTful services, showing how BPM can be used to design and implement hypermedia-based services.
Dr. Toufic Boubez discusses the status of cloud computing and the siloes being formed at the infrastructure level, emphasizing the need for enterprise mobility, and offering some mobility models.
Jürgen Kress discusses the current status and the future of cloud computing, and the role of SOA in creating a cloud computing infrastructure, plus some of the cloud offerings existing today.
Steve Ross-Talbot presents Savara, comprising a set of tools enabling enterprise architects to validate various artifacts against other artifacts based on the “Testable Architecture” methodology.
Nicolai M. Josuttis discusses various issues encountered when implementing SOA security: heterogeneity and debugging are problematic, ESB plays an important role, and costs involved.
Anne Thomas Manes discusses SOA goals and objectives used to measure a system’s success, measuring the business value, SOA project metrics, and recommendations on proving the business value of SOA.
Eric Jan Malotaux discusses implementing SOA in small iterative steps, each step delivering value to stakeholders, using feedback from previous steps to adjust the requirements and design accordingly.
Jason Macy details the basic requirements for security testing and SOA gateway, attack examples and countermeasures to protect against SQL Injection, DoS, XSD Mutation, and Identity type of attacks.
Mark Little presents the constituents of a modern SOI and where open source implementations stand in terms of standards, tools, ease of use, performance and reliability.