We are an authority in building Private Cloud Infra. Something that I have been longing to write for a while but wanted to be sure if we were not missing anything. With a tested methodology and deep expertise across parts of a service ready stack, in place, we can help customers transition their Core Technology Infrastructure to Cloud Infra.
Our offering is independent of any Virtualization or Storage or Interconnect technology. We can assist customers chose an appropriate stack that will provide full scale Automation and Orchestration. Resource provisioning thru our self service portal is not only anÂ assuredÂ cost effective outcome but dramatically easier – all within a policy framework.
Cloud Reference Architecture (Locuz Proprietary)
Our Integration capabilities offer the flexibility of using your Private Cloud like any SMT service and add capabilities likeÂ charge back.
Over next few posts I wish to elaborate our capabilities and experiences in customer environments.
Identity Management is the corner stone of Governance and more so in the case of SOA.
SOA interactions impose tremendous complexity on being able to make each interaction accountable from user access standpoint and unlike Identity in monolith applications; Identity for each interaction will have to be brokered effectively.
It may be useful to plan and perhaps deploy Identity Management early in the cycle of SOA readiness and more importantly the SOA blueprint should capture protection in the form of accountability for both service consumer and provider – just like the way it does for Interoperability, service discoverability and predictability of service performance.
I thought this may be a useful discussion for many CIO’s. During several meetings around Governance this point emerged as one very important subject. I spoke on similar lines at an IDC event in Doha because of the special interest expressed by attending CIOâ€™s.
Please post your comments and thoughts, we could all learn from experiences of many.
Here too my paper got selected and am speaking at the Bangalore event.
The topic is same as the one I spoke at INTEROP but this time around, I will touch base on â€œService Orientation for the Enterprise Cloudâ€. You may wonder, cloud is all about service orientation anyway so what would SOC (my musings on SOx, after SOI & SOM) – Service Oriented Cloud – be about.
As cloud definitions and perspectives evolve, we found our way to explain what goes within and beyond.
See you at the BT Summit.
We are organising an event on 20-Aug-2009. The event will cover Security framework in the service-oriented economy.
You will hear from us about the “critical shift” with IdM and Access Management in todayâ€™s environment that is brought on by increased service standards, improved systems and business agility.
If SOA is the way to go, understanding the “critical shift” may be equally important.
Here is the invitation.
Go thru the program details, and do register if you wish to attend.
The paper I presented got approved and I have confirmed to speak.
Hopefully the first INTEROP in India will match the scale and popularity it is identified with.
If you are visiting, ping me, I will be happy to meet.
I was in Dubai on the last weekend of August, hosted by Symantec for their Partner Event called – Partner Engage 2008.
It was nicely done event.
We were conferred the award – Partner for Emerging Solutions. This is well deserved because it resonates with our focus on IT Automation and our SOM (Services Oriented Management) strategy.
SOM is the cornerstone of SOI and we have been able to successfully develop blue print for customers that brings enormous visibility into their Enterprise Infrastructure assisting making informed decisions. The relationship between CIâ€™s (Configuration Items) is key to our SOM approach including users (is user a CI? Yes!).
The award by Symantec is to recognize us in helping customers offer technology; processes and sustainable methodology in building the blocks that will make them Adaptive Enterprise.
Thanks and Cheers!
Entitlement Management (EM) pitched as something that delivers the layer outside applications to deal with entitlements which otherwise is within any application is the best direction in making SOA and SOI a greater business driver.
It is in real sense evolution of Secure Access Management with granularity that all lines of business with their applications would demand.
We have deployed Identity Management and/or Access Management solutions for few customers and I keep hearing about the business benefits they realized. Now if I think of EM for these customers and many others (with whom we are currently planning) will bring even greater benefits.
IDM and Secure Access Management are best known ways to scale the Enterprise Infrastructure among other things as Businesses demand quick ramp up. Entitlement Management will not just help scaling but will bring the flexibility in enforcing granular controls running as a shared service layer.
Hereâ€™s some interesting reading.
Sun is offering free Identity & Access Management Course and I found this useful.
If you are one among many we have been coming across, often, wondering for a while – “how useful this piece is to my IT & Business environment?” This may do a little good, however the real way to overcome your uncertainty is in talking to us . Cheers! Uttam