<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-11168006</id><updated>2025-10-14T00:12:33.409-07:00</updated><category term="SOA"/><category term="people"/><category term="business"/><category term="REST"/><category term="cloud"/><category term="big data"/><category term="Java"/><category term="Google"/><category term="rant"/><category term="vendors"/><category term="SaaS"/><category term="hadoop"/><category term="performance"/><category term="MDM"/><category term="IT"/><category term="WS-*"/><category term="App Engine"/><category term="Web 2.0"/><category term="predictions"/><category term="security"/><category term="Apple"/><category term="contract"/><category term="data"/><category term="Enterprise Architecture"/><category term="gerald"/><category term="project"/><category term="reliability"/><category term="anti-patterns"/><category term="business SOA"/><category term="iPhone"/><category term="BPM"/><category term="Software Development"/><category term="WS"/><category term="change"/><category term="design"/><category term="humour"/><category term="standards"/><category term="analytics"/><category term="patents"/><category term="social business"/><category term="ERP"/><category term="JavaOne"/><category term="Microsoft"/><category term="decoded"/><category term="information"/><category term="value"/><category term="Business Data Lake"/><category term="EDA"/><category term="ESB"/><category term="IBM"/><category term="Mashups"/><category term="NoSQL"/><category term="POA"/><category term="Prior Art"/><category term="SLA"/><category term="SQL"/><category term="caching"/><category term="definition"/><category term="enterprise"/><category term="iOS"/><category term="interfaces"/><category term="package"/><category term="satire"/><category term="virtualisation"/><category term="BSA"/><category term="EDW"/><category term="Google Maps"/><category term="Java SE 7"/><category term="Microservices"/><category term="business architecture"/><category term="culture"/><category term="fail"/><category term="fast data"/><category term="geo-ripping"/><category term="integration"/><category term="joke"/><category term="mobile"/><category term="platforms"/><category term="quota"/><category term="technology"/><category term="thinking"/><category term="BPEL"/><category term="BSB"/><category term="FUD"/><category term="Facebook"/><category term="GDA"/><category term="HCI"/><category term="HTML5"/><category term="Java SE"/><category term="Javascript"/><category term="OASIS"/><category term="Open Source"/><category term="Oracle"/><category term="Predictive Analytics"/><category term="QoS"/><category term="Ruby"/><category term="SOD"/><category term="Wikipedia"/><category term="advertising"/><category term="analysts"/><category term="architecture"/><category term="bluffers"/><category term="budget"/><category term="canonical form"/><category term="comedy"/><category term="customer service"/><category term="documentation"/><category term="economics"/><category term="engineering"/><category term="failure"/><category term="federation"/><category term="formalism"/><category term="future"/><category term="geo-social"/><category term="governance"/><category term="holiday"/><category term="hype"/><category term="internet"/><category term="language design"/><category term="methodology"/><category term="metrics"/><category term="open cloud"/><category term="practice"/><category term="principles"/><category term="scale"/><category term="semantic"/><category term="simple IT"/><category term="single canonical form"/><category term="snakeoil"/><category term="socbiz"/><category term="software"/><category term="strategy"/><category term="tools"/><category term="us border"/><category term=".net"/><category term="3Vs"/><category term="AI"/><category term="AM"/><category term="Adobe"/><category term="Air"/><category term="App"/><category term="AppStore"/><category term="BBC iPlayer"/><category term="BDL"/><category term="BEA"/><category term="BI"/><category term="BT"/><category term="BT Vision"/><category term="BTL"/><category term="BeJUG"/><category term="Blueprints"/><category term="British Airways"/><category term="CBP"/><category term="CISPA"/><category term="CO2"/><category term="Carbon"/><category term="DOA"/><category term="DR"/><category term="Data Privacy"/><category term="Data Quality"/><category term="DevOps"/><category term="Dual Spark"/><category term="EAI"/><category term="EU"/><category term="Flex"/><category term="Globalisation"/><category term="Google+"/><category term="HDFS"/><category term="Information Fabric"/><category term="JBI"/><category term="JCP"/><category term="JDO"/><category term="Java SE 8"/><category term="Las Vegas"/><category term="Legacy"/><category term="MSN"/><category term="NFC"/><category term="Orange"/><category term="PaaS"/><category term="Paris"/><category term="R"/><category term="RPC"/><category term="Rules"/><category term="SAP"/><category term="SCA"/><category term="SOAP"/><category term="Scala"/><category term="Sky+"/><category term="Sun"/><category term="TCO"/><category term="TSOA"/><category term="Tivo"/><category term="UI"/><category term="UML"/><category term="Uber"/><category term="VC"/><category term="VM"/><category term="VME"/><category term="VPN"/><category term="Vista"/><category term="War"/><category term="WebSockets"/><category term="XML"/><category term="XaaS"/><category term="adoption"/><category term="airlines"/><category term="airports"/><category term="apple TV"/><category term="architects"/><category term="autonomous cars"/><category term="big"/><category term="chuck norris"/><category term="clint eastwood"/><category term="code"/><category term="coding"/><category term="collaboration"/><category term="commandments"/><category term="complexity"/><category term="conferences"/><category term="consultancy"/><category term="cybersecurity"/><category term="data lake"/><category term="data science"/><category term="data warehousing"/><category term="database"/><category term="dead"/><category term="debt"/><category term="decisions"/><category term="delivery"/><category term="divide"/><category term="dumb"/><category term="eclipse"/><category term="education"/><category term="estimation"/><category term="fashion"/><category term="finance"/><category term="funding"/><category term="games"/><category term="government"/><category term="heatmap"/><category term="history"/><category term="iPad"/><category term="iPhone 4"/><category term="iPod"/><category term="infrastructure"/><category term="issue"/><category term="jobs"/><category term="kick-off"/><category term="learning"/><category term="legal"/><category term="lexicon"/><category term="marketing"/><category term="maths"/><category term="meta-data"/><category term="middleware"/><category term="mobility"/><category term="modelling"/><category term="next"/><category term="omnichannel"/><category term="opinion"/><category term="phones"/><category term="pivotal"/><category term="policy"/><category term="pop"/><category term="predications"/><category term="pricing"/><category term="private"/><category term="product"/><category term="public"/><category term="public transport"/><category term="python"/><category term="quality"/><category term="raspberryPI"/><category term="real-time"/><category term="recession"/><category term="recovery"/><category term="redundancy"/><category term="refactoring"/><category term="religion"/><category term="requirements"/><category term="requirements landfill"/><category term="resource"/><category term="revolution"/><category term="rightscale"/><category term="rocksDB"/><category term="safety"/><category term="scam"/><category term="scope creep"/><category term="selling"/><category term="services"/><category term="silly"/><category term="skype"/><category term="snowden"/><category term="social media"/><category term="specifications"/><category term="spying"/><category term="stateless"/><category term="streaming"/><category term="systems"/><category term="threats"/><category term="time machine"/><category term="tin"/><category term="travel"/><category term="vacation"/><category term="valley thinking"/><category term="video"/><category term="vision"/><category term="yahoo"/><category term="yahoo pipes"/><category term="zombies"/><title type='text'>Business SOA</title><subtitle type='html'>A Simple blog about Business SOA and generally about how to drive IT from a business perspective. All opinions are mine and should be taken with a pinch of salt etc etc</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default?alt=atom&amp;start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>586</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-11168006.post-2086994510634533525</id><published>2020-09-17T08:31:00.007-07:00</published><updated>2020-09-17T08:33:48.634-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="services"/><title type='text'>Service Accounts suck - why data futures require end to end authentication.</title><summary type="text">&amp;nbsp;Can we all agree that &quot;service&quot; accounts suck from a security perspective.&amp;nbsp; Those are the accounts that you set up so what system/service can talk to another one.&amp;nbsp; Often this will be a database connection so the application uses one account (and thus one connection pool) to access the database.&amp;nbsp; These service accounts are sometimes unique to a service or application, but </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/2086994510634533525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/2086994510634533525' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2086994510634533525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2086994510634533525'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2020/09/service-accounts-suck-why-data-futures.html' title='Service Accounts suck - why data futures require end to end authentication.'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-7919900922498608401</id><published>2020-08-27T11:00:00.002-07:00</published><updated>2020-08-27T11:00:16.814-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Java"/><category scheme="http://www.blogger.com/atom/ns#" term="raspberryPI"/><category scheme="http://www.blogger.com/atom/ns#" term="rocksDB"/><title type='text'>Getting RocksDB working on Raspberry PI (Unsatisfied linker error when trying to run Kafka Streams)</title><summary type="text">&amp;nbsp;If you are here its probably because you&#39;ve tried to get RocksDB working on a Raspberry PI and had the following exception:Exception in thread &quot;main-broker-b066f428-2e48-4d73-91cd-aab782bd9c4c-StreamThread-1&quot; java.lang.UnsatisfiedLinkError: /tmp/librocksdbjni7453541812184957798.so: /tmp/librocksdbjni7453541812184957798.so: cannot open shared object file: No such file or directory (Possible </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/7919900922498608401/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/7919900922498608401' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/7919900922498608401'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/7919900922498608401'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2020/08/getting-rocksdb-working-on-raspberry-pi.html' title='Getting RocksDB working on Raspberry PI (Unsatisfied linker error when trying to run Kafka Streams)'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-4734367763666173323</id><published>2016-08-24T00:21:00.002-07:00</published><updated>2016-08-24T00:22:56.393-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="holiday"/><category scheme="http://www.blogger.com/atom/ns#" term="opinion"/><title type='text'>Why taking good holidays is good practice</title><summary type="text">
Back when I was a fairly recent graduate I received one of the best pieces of advice I&#39;ve ever received. &amp;nbsp;The project was having some delivery pressures and I was seen as crucial to one of the key parts. &amp;nbsp;As a result my manager was putting pressure on me to cancel my holiday (two weeks of Windsurfing bliss in the Med with friends) with a promise that the company would cover the costs. </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/4734367763666173323/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/4734367763666173323' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4734367763666173323'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4734367763666173323'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2016/08/why-taking-good-holidays-is-good.html' title='Why taking good holidays is good practice'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-2077881043300830138</id><published>2016-08-01T11:42:00.000-07:00</published><updated>2016-08-01T11:42:13.326-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="architecture"/><category scheme="http://www.blogger.com/atom/ns#" term="comedy"/><category scheme="http://www.blogger.com/atom/ns#" term="commandments"/><title type='text'>The ten commandments of IT projects</title><summary type="text">

And lo a new project did start and there was much wailing and gnashing of teeth, for up on the board had been nailed ten commandments that the project must follow and the developers were sore afraid.


Thou shalt put everything in version control, yeah even the meeting minutes, presentations and &quot;requirements documents that aren&#39;t even finished yet&quot; for without control everything is chaos
Thou </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/2077881043300830138/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/2077881043300830138' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2077881043300830138'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2077881043300830138'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2016/08/the-ten-commandments-of-it-projects.html' title='The ten commandments of IT projects'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-7841356214547860781</id><published>2015-01-28T07:59:00.000-07:00</published><updated>2015-01-28T07:59:00.453-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business architecture"/><category scheme="http://www.blogger.com/atom/ns#" term="business SOA"/><category scheme="http://www.blogger.com/atom/ns#" term="DevOps"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Development"/><title type='text'>Making DevOps Business Driven - a service view</title><summary type="text">
I&#39;ve been doing a bit recently around DevOps and what I&#39;ve been seeing is that companies that having been scaling DevOps tend to run into a problem: exactly what is a good boundary for a DevOps team?&amp;nbsp;Now I&#39;ve talked before about how Microservices are just SOA with a new logo, well there is an interesting piece about DevOps as well, its not actually a brand new thing. &amp;nbsp;Its an evolution </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/7841356214547860781/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/7841356214547860781' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/7841356214547860781'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/7841356214547860781'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/making-devops-business-driven-service.html' title='Making DevOps Business Driven - a service view'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/Ut1uGLkEYGnUZXA56ynQz7wzzoXbBaqn_qvSbG0SiYDmnLmjQfdl8YVv9xTRzZ9SAgNyxs3JCMf11X9V8xTY_uSwqdhpp5Z_Fb7yGV1DpePOYZafSt1ybdUN2jEWmsefhzk=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-5392100060734016272</id><published>2015-01-20T08:00:00.000-07:00</published><updated>2015-01-20T08:00:06.665-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="meta-data"/><title type='text'>Big Data and the importance of Meta-Data</title><summary type="text">
Data isn&#39;t really respected in businesses, you can see that because unlike other corporate assets there is rarely a decent corporate catalog that shows what exists and who has it. &amp;nbsp;In the vast majority of companies there is more effort and automation put into tracking laptops than there is into cataloging and curating information.

Historically we&#39;ve sort of been able to get away with this </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/5392100060734016272/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/5392100060734016272' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/5392100060734016272'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/5392100060734016272'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/big-data-and-importance-of-meta-data.html' title='Big Data and the importance of Meta-Data'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8870735670178834663</id><published>2015-01-15T08:00:00.000-07:00</published><updated>2015-01-15T08:00:05.451-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Security Big Data - Part 7 - a summary</title><summary type="text">
Over six parts I&#39;ve gone through a bit of a journey on what Big Data Security is all about.

Securing Big Data is about layers
Use the power of Big Data to secure Big Data
How maths and machine learning helps
Why its how you alert that matters
Why Information Security is part of Information Governance
Classifying Risk and the importance of Meta-Data


The fundamental point here is that </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8870735670178834663/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8870735670178834663' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8870735670178834663'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8870735670178834663'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/security-big-data-part-7-summary.html' title='Security Big Data - Part 7 - a summary'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8181367719603461835</id><published>2015-01-13T08:00:00.000-07:00</published><updated>2015-01-13T08:00:00.706-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data Part 6 - Classifying risk</title><summary type="text">
So now your Information Governance&amp;nbsp;groups consider Information Security to be important you have to then think about how they should be classifying the risk. &amp;nbsp;Now there are docs out there on some of these which talk about frameworks. &amp;nbsp;British Columbia&#39;s government has one for instance that talks about High, Medium and Low risk, but for me that really misses the point and over </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8181367719603461835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8181367719603461835' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8181367719603461835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8181367719603461835'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-6-classifying.html' title='Securing Big Data Part 6 - Classifying risk'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8574722497695905901</id><published>2015-01-12T08:00:00.000-07:00</published><updated>2015-01-12T08:00:03.177-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data Part 5 - your Big Data Security team</title><summary type="text">
What does your security team look like today?



Or the IT equivalent, &quot;the folks that say no&quot;. &amp;nbsp;The point is that in most companies information security isn&#39;t actually something that is considered important. &amp;nbsp;How do I know this? &amp;nbsp;Well because basically most IT Security teams are the equivalent of the nightclub bouncers, they aren&#39;t the people who own the club, they aren&#39;t as </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8574722497695905901/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8574722497695905901' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8574722497695905901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8574722497695905901'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-5-your-big-data.html' title='Securing Big Data Part 5 - your Big Data Security team'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7wXBqqeRbyYwih2q5n-3kwupZpwbSN7AkCYYixrPjndU58rn5tdMzPpnfsqj79KocDfiXLCx_ieT95hXYN1Z8I_m8-EWCKTPvfYKgV0lqXUEAqzn6SbUnIJrB7QxQ1DT7WAXW/s72-c/Picture7.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8942140999245344327</id><published>2015-01-09T08:00:00.000-07:00</published><updated>2015-01-09T08:00:04.190-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data - Part 4 - Not crying Wolf.</title><summary type="text">
In the first three parts of this I talked about how&amp;nbsp;Securing Big Data is about layers, and then about how you need to&amp;nbsp;use the power of Big Data to secure Big Data, then how maths and machine learning helps to identify what is reasonable and was is anomalous.

The&amp;nbsp;Target Credit Card hack&amp;nbsp;highlights this problem. &amp;nbsp;Alerts were made, lights did flash. &amp;nbsp;The problem was </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8942140999245344327/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8942140999245344327' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8942140999245344327'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8942140999245344327'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-4-not-crying-wolf.html' title='Securing Big Data - Part 4 - Not crying Wolf.'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5LBBDCkqqUeD6_ZW7fR3Yzbr9zxrCjNvRfy67ZGYW0fkb_UahExPBOUIlP8zBl7ADrCVcb5tVxGIetQ-IhXhQO5jQrIGuG6AzYC-UGghpbuwDfC9Tu6ER5v_Mrh6EDqmmibXz/s72-c/Picture6.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-6450668479168009838</id><published>2015-01-08T08:00:00.000-07:00</published><updated>2015-01-08T08:00:00.142-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data - Part 3 - Security through Maths</title><summary type="text">
In the first two parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data. &amp;nbsp;The next part is &quot;what do you do with all that data?&quot;.&amp;nbsp; &amp;nbsp;This is where Machine Learning and Mathematics comes in, in other words its about how you use Big Data analytics to secure Big Data.

What you want to do is build </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/6450668479168009838/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/6450668479168009838' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6450668479168009838'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6450668479168009838'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-3-security.html' title='Securing Big Data - Part 3 - Security through Maths'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0CgAeDKN3hgw-w_92Vi6KjYw9g_1SIWZXmFsx8wquPUDXSo4OxDkXRiUq3plblxrl3xNyBzHzaf_o4LC0nvSqe24e3MGmAYIjUUvgJQBSclWB39U_Umnz9o0CDb6l_04VhkoM/s72-c/Picture4.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-417728745740934749</id><published>2015-01-07T08:00:00.000-07:00</published><updated>2015-01-07T08:00:00.936-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data - Part 2 - understanding the data required to secure it</title><summary type="text">
In the first part of Securing Big Data I talked about the two different types of security. &amp;nbsp;The traditional IT and ACL security that needs to be done to match traditional solutions with an RDBMS but that is pretty much where those systems stop in terms of security which means they don&#39;t address the real threats out there, which are to do with cyber attacks and social engineering. &amp;nbsp;An </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/417728745740934749/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/417728745740934749' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/417728745740934749'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/417728745740934749'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-2-understanding.html' title='Securing Big Data - Part 2 - understanding the data required to secure it'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTBFE8IB220A62VqNffDzCB7bp0zmSO5K7MSF3EjogLfBidfFehl6zCr6KNTMgWOvEeLyCaqsW6Pn1YikoE-64oMtESkO8_oLqW21QMQuSMAiYY6lrWEG3ooa_W3leP1oCcQ_E/s72-c/Picture2.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-4508333577915374952</id><published>2015-01-06T08:00:00.000-07:00</published><updated>2015-01-06T08:00:00.750-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Securing Big Data - Part 1</title><summary type="text">
As Big Data and its technologies such as Hadoop head deeper into the enterprise so questions around compliance and security rear their heads.

The first interesting point in this is that it shows the approach to security that many of the Silicon Valley companies that use Hadoop at scale have taken, namely pretty little really. &amp;nbsp;It isn&#39;t that protecting information has been seen as a </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/4508333577915374952/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/4508333577915374952' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4508333577915374952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4508333577915374952'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2015/01/securing-big-data-part-1.html' title='Securing Big Data - Part 1'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTUxDerhWXb1nxBP03Kzc4QhwyTweu4IVTlQ4WkxRzr72PA4IweOHi_hIJfXog80RfHVlIRFb1FXwiuW71SFiy61H7kp8SI64obN6MLl8vFrMYWNe-rJFtdv5OUPdVsn28NvQg/s72-c/Picture1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-183180970494177031</id><published>2014-10-14T08:30:00.000-07:00</published><updated>2014-10-14T08:30:00.131-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="autonomous cars"/><category scheme="http://www.blogger.com/atom/ns#" term="public transport"/><category scheme="http://www.blogger.com/atom/ns#" term="Uber"/><title type='text'>Uber won&#39;t want drivers in the future</title><summary type="text">
I&#39;m an Uber user, its a great service outside of cities with decent public transport. &amp;nbsp;But I have been thinking about where they will justify the $17bn valuation and give people a return on that $1.2bn investment. &amp;nbsp;At the same time I&#39;ve been following the autonomous car pieces with interest and I think there is a pretty clear way this can end, especially as Uber have already said they </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/183180970494177031/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/183180970494177031' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/183180970494177031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/183180970494177031'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/10/uber-wont-want-drivers-in-future.html' title='Uber won&#39;t want drivers in the future'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-6885932058768579515</id><published>2014-08-07T08:00:00.000-07:00</published><updated>2014-08-07T08:00:02.265-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="Dual Spark"/><category scheme="http://www.blogger.com/atom/ns#" term="history"/><title type='text'>Whistler, Microsoft and how far cloud has come</title><summary type="text">
In six years Microsoft has come from almost zero corporate knowledge about how cloud computing works to it being an integral part of their strategy. &amp;nbsp;Sure back in early 2008 there were some pieces of Microsoft that knew about cloud but that really wasn&#39;t a corporate view it was what a very few people inside the company knew.

How do I know this? Well back in 2008 I was sitting on the top of</summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/6885932058768579515/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/6885932058768579515' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6885932058768579515'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6885932058768579515'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/08/whistler-microsoft-and-how-far-cloud.html' title='Whistler, Microsoft and how far cloud has come'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-2297551420522325651</id><published>2014-07-14T08:10:00.000-07:00</published><updated>2014-07-14T08:10:00.362-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="hype"/><title type='text'>Big Data doom mongers need to look outside of the marketing department</title><summary type="text">
In every change there are hype machines that over play and sages who call doom. &amp;nbsp;Into the Big Data arena steps David Searls to proclaim that Big Data is a myth and simply hype which is set to burst in an article over at ZDNet.

But big data, he said, is nothing more than the myth that collecting vast amounts of data can help companies know customers better than those customers even know </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/2297551420522325651/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/2297551420522325651' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2297551420522325651'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2297551420522325651'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/07/big-data-doom-mongers-need-to-look.html' title='Big Data doom mongers need to look outside of the marketing department'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8488127334884469760</id><published>2014-06-27T08:00:00.000-07:00</published><updated>2014-06-27T08:00:05.362-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="funding"/><category scheme="http://www.blogger.com/atom/ns#" term="Java"/><category scheme="http://www.blogger.com/atom/ns#" term="Open Source"/><category scheme="http://www.blogger.com/atom/ns#" term="VC"/><title type='text'>Open Source as religion - when the Bazaar becomes a Cathedral</title><summary type="text">
The seminal book on Open Source development &quot;Cathedral and the Bazaar&quot; talks eloquently about the difference between commercial software development and open source development. &amp;nbsp;In the past few years however there has been another shift, a shift where companies are actively releasing their technology into Open Source as a competitive differentiation. &amp;nbsp;A claim of &#39;we are open&#39; because </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8488127334884469760/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8488127334884469760' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8488127334884469760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8488127334884469760'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/06/open-source-as-religion-when-bazaar.html' title='Open Source as religion - when the Bazaar becomes a Cathedral'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-96665548766529624</id><published>2014-05-27T08:00:00.000-07:00</published><updated>2014-05-27T08:00:00.540-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Quality"/><category scheme="http://www.blogger.com/atom/ns#" term="federation"/><category scheme="http://www.blogger.com/atom/ns#" term="MDM"/><title type='text'>MDM isn&#39;t about data quality its about collaboration</title><summary type="text">
I&#39;m going to state a sacrilegious position for a moment: the quality of data isn&#39;t a primary goal in Master Data Management

Now before the perfectly correct &#39;Garbage In, Garbage Out&#39; statement let me explain. &amp;nbsp;Data Quality is certainly something that MDM can help with but its not actually the primary aim of MDM.

MDM is about enabling collaboration, collaboration is about the </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/96665548766529624/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/96665548766529624' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/96665548766529624'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/96665548766529624'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/05/mdm-isnt-about-data-quality-its-about.html' title='MDM isn&#39;t about data quality its about collaboration'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8358588724380795591</id><published>2014-05-22T11:00:00.000-07:00</published><updated>2014-05-22T11:00:02.177-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><title type='text'>Lipstick on the iceberg - why the local view matters for IT evolution</title><summary type="text">
There is a massive amount of IT hype that is focused on what people see, its about the agile delivery of interfaces, about reporting, visualisation and interactional models. &amp;nbsp;If you could weight hype then it is quite clear that 95% of all IT is about this area. &amp;nbsp;Its why we need development teams working hand-in-hand with the business, its why animations and visualisation are massively </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8358588724380795591/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8358588724380795591' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8358588724380795591'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8358588724380795591'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/05/lipstick-on-iceberg-why-local-view.html' title='Lipstick on the iceberg - why the local view matters for IT evolution'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-4295340359569815788</id><published>2014-05-22T08:00:00.000-07:00</published><updated>2014-05-22T08:00:04.699-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="enterprise"/><category scheme="http://www.blogger.com/atom/ns#" term="fast data"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><category scheme="http://www.blogger.com/atom/ns#" term="HDFS"/><title type='text'>How to select a Hadoop distro - stop thinking about Hadoop</title><summary type="text">
Scoop, Flume, PIG, Zookeeper. &amp;nbsp;Do these mean anything to you? &amp;nbsp;If they do then the odds are you are looking at Hadoop. &amp;nbsp;The thing is that while that was cool a few years ago it really is time to face it that HDFS is a commodity, Map Reduce is interesting but not feasible for most users and the real question is how we turn all that raw data in HDFS into something we can actually </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/4295340359569815788/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/4295340359569815788' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4295340359569815788'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/4295340359569815788'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/05/how-to-select-hadoop-distro-stop.html' title='How to select a Hadoop distro - stop thinking about Hadoop'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-2079234884903245053</id><published>2014-04-24T11:27:00.003-07:00</published><updated>2014-05-23T13:14:23.094-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="Business Data Lake"/><category scheme="http://www.blogger.com/atom/ns#" term="data lake"/><category scheme="http://www.blogger.com/atom/ns#" term="EDW"/><category scheme="http://www.blogger.com/atom/ns#" term="hadoop"/><title type='text'>Data Lakes will replace EDWs -  a prediction</title><summary type="text">
Over the last few years there has been a trend of increased spending on BI, and that trend isn&#39;t going away. &amp;nbsp;The analyst predictions however have, understandably, been based on the mentality that the choice was between a traditional EDW/DW model or Hadoop. &amp;nbsp;With the new &#39;Business Data Lake&#39; type of hybrid approach its pretty clear that the shift is underway for all vendors to have a </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/2079234884903245053/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/2079234884903245053' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2079234884903245053'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/2079234884903245053'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/04/data-lakes-will-replace-edws-prediction.html' title='Data Lakes will replace EDWs -  a prediction'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5MkUWTEkGe4HJGqdwHtGAwniuhO7QIX3A2qJH6xRoNCo5XrwzWsXfI7sOuSmE6APJ4xVsN7dPXhKmYegi-Ye2EXc6KCcpHzD_7E4FMHWPNvoEesTGofjYDXNGDwxoYSrmkSYM/s72-c/OldPrediction.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-6191934687910994242</id><published>2014-03-25T08:06:00.003-07:00</published><updated>2014-03-25T08:06:44.334-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microservices"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><category scheme="http://www.blogger.com/atom/ns#" term="SOD"/><title type='text'>Microservices is SOD all within SOA</title><summary type="text">
Microservices is a Service Oriented Delivery approach, all within a Service Oriented Architecture context.
(Long Title ;)

Ok so a few more updates since the last time I wrote about Microservices and I think its worth just updating as it really is heavily underlining why Microservices is a Service Oriented Delivery approach that absolutely can fit within a Service Oriented Architecture. &amp;nbsp;</summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/6191934687910994242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/6191934687910994242' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6191934687910994242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6191934687910994242'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/03/microservices-is-sod-all-within-soa.html' title='Microservices is SOD all within SOA'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-6254101319446335178</id><published>2014-03-18T08:05:00.002-07:00</published><updated>2014-03-18T08:05:37.134-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microservices"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><category scheme="http://www.blogger.com/atom/ns#" term="SOD"/><title type='text'>Microservices is SOA, for those who know what SOA is.</title><summary type="text">
Ok so its started a bit of debate on Twitter and now there have been emails, but in the spirit of openness I thought I&#39;d better blog. &amp;nbsp;Now its good that Martin has now added a side bar on SOA to his article on&amp;nbsp;Microservices&amp;nbsp;but&amp;nbsp;that really makes it worse in many ways. &amp;nbsp;I&#39;ll get to that at the end but first off lets explain why Microservices is just another SOA </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/6254101319446335178/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/6254101319446335178' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6254101319446335178'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/6254101319446335178'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/03/microservices-is-soa-for-those-who-know.html' title='Microservices is SOA, for those who know what SOA is.'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-8489413221826835266</id><published>2014-03-12T11:29:00.003-07:00</published><updated>2014-03-12T11:29:32.055-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="big data"/><category scheme="http://www.blogger.com/atom/ns#" term="chuck norris"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="real-time"/><title type='text'>What is real-time? Depends on who you ask</title><summary type="text">
&quot;Real-time&quot; its a word that gets thrown about a lot in IT and its worth documenting a few of the different ways it gets used

Hard Real-time
This is what Real-time Java&amp;nbsp;was created to address (along with Soft Real-time) what is this? &amp;nbsp;Easiest way to say it is that often in Hard Real-time environments the following statement is true

If it doesn&#39;t finish in X milliseconds then people </summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/8489413221826835266/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/8489413221826835266' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8489413221826835266'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/8489413221826835266'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/03/what-is-real-time-depends-on-who-you-ask.html' title='What is real-time? Depends on who you ask'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-11168006.post-861758169924999782</id><published>2014-03-11T11:00:00.000-07:00</published><updated>2014-03-11T11:00:04.059-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microservices"/><category scheme="http://www.blogger.com/atom/ns#" term="snakeoil"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><title type='text'>Microservices - Money for old rope or re-badging SOA for the cool kids</title><summary type="text">
Hat tip to John Evedemon for the heads up on this one. &amp;nbsp;Martin Fowler is peddling a new approach, &#39;Microservices&#39; which... wait for it is a way of developing applications as a suite of services. &amp;nbsp;Each one of which has its own process thread and &#39;communicates via lightweight mechanisms&#39; such as.... over HTTP.


But wait there is more, you&#39;ll be stunned to know that these services can be</summary><link rel='replies' type='application/atom+xml' href='http://service-architecture.blogspot.com/feeds/861758169924999782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/11168006/861758169924999782' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/861758169924999782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/11168006/posts/default/861758169924999782'/><link rel='alternate' type='text/html' href='http://service-architecture.blogspot.com/2014/03/microservices-money-for-old-rope-or-re.html' title='Microservices - Money for old rope or re-badging SOA for the cool kids'/><author><name>Steve Jones</name><uri>http://www.blogger.com/profile/18324989580856894788</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry></feed>