SlideShare a Scribd company logo
1 of 16
Service Oriented Architecture: 18
SOA Trends
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
THE INEVITABLE SOA TREND
• SOA is one of the most important trends in Information
Technology today.
• SOA is now a top priority in most organizations.
• SOA is receiving all this attention because of the great
potential value it offers to those who pursue it.
• If an organization achieves a mere fraction of the total
potential value of SOA, it will be significant to that
organization's bottom line, competitive posture, and
overall operational effectiveness.
• That is why SOA is such an important strategic initiative
to pursue. SOA makes too much sense technically and
financially .
SOA Re-defined
• We may re-define SOA as a combination of a Business
Model, an IT strategy, an architectural approach, and an
implementation pattern, all predicated on the concept of
"Services.“
• SOA is a concept for development of software systems
– Using reusable building blocks (components) called "services"
• Services in SOA are:
– Autonomous
– Stateless business functions
– Accept requests and return responses
– Use well-defined, standard interface
SOA Services
• Autonomous
– Each service operates autonomously
– Without any awareness that other services exist
• Stateless
– Have no memory, do not remember state
– Easy to scale
• Request-response model
– Client asks, server returns answer
SOA Services
• Communication through standard protocols
– XML, SOAP, JSON, RSS, ATOM, ...
– HTTP, FTP, SMTP, RPC, ...
• Not dependent on OS, platforms,
programming languages
• Discoverable
– Service registries
SOA and Business Processes
Management (BPM)
• Composite applications
– Assembled form a set of services combined to
support a business process
– Business agility
• Allows quick reaction to changes
• Business Process Management (BPM)
– Composite applications support
• Process orchestration, execution, monitoring and
optimization
Loose Coupling
• Loose coupling – main concept of SOA
• Loosely coupled components:
– Exhibits single function
– Independent of other functions
– Through a well-defined interface
• Loose coupling programming evolves:
– Structural programming
– Object-oriented programming
– Service-oriented architecture (SOA)
SOA and Web 2.0
• Moving to a "services model" – global IT trend
for both:
– Internet business
– Inside an enterprise
• Two main SOA scenarios
– SOA in Internet
• Software as service, Web 2.0, RIA, ...
– SOA inside an enterprise
• Heavy SOA stacks: WS-*, BPM, BPEL, WCF, SCA, ESB, ...
Trends for service-orientation of the IT
business
SOA in Internet
• Internet companies implement lightweight
SOA in Internet
– Also called WOA (Web-Oriented Architecture)
– Examples: Google, Amazon, Facebook, ...
– Tend to provide software as service
– Based on lightweight Web standards:
• AJAX and Rich Internet Applications (RIA)
• REST, RSS, JSON, proprietary APIs
SOA in Enterprises
– Driven by business processes: BPM, BPMN, BPEL,
...
– Enterprise application integration (EAI)
– B2B integration
– SOA based portals
– Unified Frameworks: SCA and WCF
– Enterprise Service Bus (ESB)
– SOA governance (control)
SOA Adoption
• Why SOA adoption is slow?
– SOA is a Customized Application technology
• It is a better approach to IT
– SOA is not a "buy" solution
• It is a "build" solution
• Purchasing a SOA platform product can not turn IT
infrastructure to SOA
– Slow migration trend to SOA
• New software is build with SOA in mind
• Old software is adopted to support SOA
Obstacles in SOA Adoption
• Obstacles to SOA adoption in enterprises
– Need of new thinking for the IT
– Resources, tasks, budgets and skills need to be
shared across projects and not dedicated solely to
a single project
– Unclear return of investments (ROI)
SOA Infrastructure Trends
• Virtualization will impact SOA deployment
• Computing clouds will impact SOA
– Amazon and SalesForce already have "computing
clouds" solutions
• SOA scale-out infrastructures build on low-
cost hardware adoption
– Google, eBay, Amazon and PayPal already have
such technology
SOA Technology Trends
• Adoption of SOA patterns and EAI patterns
• Open source SOA products will get more market
share
• In Java world: increase of OSGi adoption
• In Microsoft world: WCF adoption
• Domain-specific languages for SOA
• Adoption of lightweight technologies (REST, JSON,
...) will run in parallel with adoption of SOAP and
WS-* technologies
– Abstract APIs like WCF and SCA will emerge
Assignment
• Discuss in detail the general trends in SOA
Adoption by Enterprise Business.
• Thank You

More Related Content

What's hot

Cloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureCloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureYan Zhao
 
Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standardsPooja Dixit
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma AccessHaris Chughtai
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elementsPooja Dixit
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
palo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxpalo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxinfoeliechahine
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed SystemRajan Kumar
 
Introduction to AWS Greengrass on IoT
Introduction to AWS Greengrass on IoTIntroduction to AWS Greengrass on IoT
Introduction to AWS Greengrass on IoTAmazon Web Services
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationRishabh Dangwal
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Dharmesh Patel
 

What's hot (20)

Cloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureCloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented Architecture
 
Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standards
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
SD WAN
SD WANSD WAN
SD WAN
 
Transactional workflow
Transactional workflowTransactional workflow
Transactional workflow
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Service view
Service viewService view
Service view
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elements
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
palo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxpalo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptx
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 
A physical view
A physical viewA physical view
A physical view
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Introduction to AWS Greengrass on IoT
Introduction to AWS Greengrass on IoTIntroduction to AWS Greengrass on IoT
Introduction to AWS Greengrass on IoT
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 

Similar to Soa 18 soa trends

Establishing an SOA Focused Enterprise Architecture
Establishing an SOA Focused Enterprise ArchitectureEstablishing an SOA Focused Enterprise Architecture
Establishing an SOA Focused Enterprise ArchitectureAsanka Abeysinghe
 
Streamline your SOA Portfolio
Streamline your SOA Portfolio Streamline your SOA Portfolio
Streamline your SOA Portfolio WSO2
 
Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference Arnaud Bouchez
 
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise Architecture
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise ArchitectureWSO2Con US 2013 - Establishing an SOA-Focused Enterprise Architecture
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise ArchitectureWSO2
 
Manish_rawal_Background_final3
Manish_rawal_Background_final3Manish_rawal_Background_final3
Manish_rawal_Background_final3Manish Rawal
 
Manish Rawal Solution Architect
Manish Rawal Solution ArchitectManish Rawal Solution Architect
Manish Rawal Solution ArchitectManish Rawal
 
Building A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityBuilding A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityProgrammableWeb
 
SharePoint as a Business Platform Why, What and How? – No Code
SharePoint as a Business Platform Why, What and How? – No CodeSharePoint as a Business Platform Why, What and How? – No Code
SharePoint as a Business Platform Why, What and How? – No Codedox42
 
Ultra-scale e-Commerce Transaction Services with Lean Middleware
Ultra-scale e-Commerce Transaction Services with Lean Middleware Ultra-scale e-Commerce Transaction Services with Lean Middleware
Ultra-scale e-Commerce Transaction Services with Lean Middleware WSO2
 
CMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOACMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOAAlexander Doré
 
adopt_soa.94145841
adopt_soa.94145841adopt_soa.94145841
adopt_soa.94145841ypai
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOAtom termini
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmedsaifam
 
Robert Schneider What Every Developer
Robert  Schneider    What Every DeveloperRobert  Schneider    What Every Developer
Robert Schneider What Every DeveloperSOA Symposium
 
SOA Methodology - Strategy (as of 2010)
SOA Methodology - Strategy (as of 2010)SOA Methodology - Strategy (as of 2010)
SOA Methodology - Strategy (as of 2010)Akiva Marks
 
Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009hanshantson
 

Similar to Soa 18 soa trends (20)

Establishing an SOA Focused Enterprise Architecture
Establishing an SOA Focused Enterprise ArchitectureEstablishing an SOA Focused Enterprise Architecture
Establishing an SOA Focused Enterprise Architecture
 
W
WW
W
 
Streamline your SOA Portfolio
Streamline your SOA Portfolio Streamline your SOA Portfolio
Streamline your SOA Portfolio
 
Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference
 
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise Architecture
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise ArchitectureWSO2Con US 2013 - Establishing an SOA-Focused Enterprise Architecture
WSO2Con US 2013 - Establishing an SOA-Focused Enterprise Architecture
 
Manish_rawal_Background_final3
Manish_rawal_Background_final3Manish_rawal_Background_final3
Manish_rawal_Background_final3
 
Manish Rawal Solution Architect
Manish Rawal Solution ArchitectManish Rawal Solution Architect
Manish Rawal Solution Architect
 
Building A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityBuilding A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer Community
 
SharePoint as a Business Platform Why, What and How? – No Code
SharePoint as a Business Platform Why, What and How? – No CodeSharePoint as a Business Platform Why, What and How? – No Code
SharePoint as a Business Platform Why, What and How? – No Code
 
Ultra-scale e-Commerce Transaction Services with Lean Middleware
Ultra-scale e-Commerce Transaction Services with Lean Middleware Ultra-scale e-Commerce Transaction Services with Lean Middleware
Ultra-scale e-Commerce Transaction Services with Lean Middleware
 
CMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOACMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOA
 
adopt_soa.94145841
adopt_soa.94145841adopt_soa.94145841
adopt_soa.94145841
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOA
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
soa ppt v7.ppt
soa ppt v7.pptsoa ppt v7.ppt
soa ppt v7.ppt
 
Robert Schneider What Every Developer
Robert  Schneider    What Every DeveloperRobert  Schneider    What Every Developer
Robert Schneider What Every Developer
 
SOA - Make your CEO Happy
SOA - Make your CEO HappySOA - Make your CEO Happy
SOA - Make your CEO Happy
 
SOA Methodology - Strategy (as of 2010)
SOA Methodology - Strategy (as of 2010)SOA Methodology - Strategy (as of 2010)
SOA Methodology - Strategy (as of 2010)
 
Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009
 
AMIS OOW Review 2012 - Deel 7 - Lucas Jellema
AMIS OOW Review 2012 - Deel 7 - Lucas JellemaAMIS OOW Review 2012 - Deel 7 - Lucas Jellema
AMIS OOW Review 2012 - Deel 7 - Lucas Jellema
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 

Soa 18 soa trends

  • 1. Service Oriented Architecture: 18 SOA Trends Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. THE INEVITABLE SOA TREND • SOA is one of the most important trends in Information Technology today. • SOA is now a top priority in most organizations. • SOA is receiving all this attention because of the great potential value it offers to those who pursue it. • If an organization achieves a mere fraction of the total potential value of SOA, it will be significant to that organization's bottom line, competitive posture, and overall operational effectiveness. • That is why SOA is such an important strategic initiative to pursue. SOA makes too much sense technically and financially .
  • 3. SOA Re-defined • We may re-define SOA as a combination of a Business Model, an IT strategy, an architectural approach, and an implementation pattern, all predicated on the concept of "Services.“ • SOA is a concept for development of software systems – Using reusable building blocks (components) called "services" • Services in SOA are: – Autonomous – Stateless business functions – Accept requests and return responses – Use well-defined, standard interface
  • 4. SOA Services • Autonomous – Each service operates autonomously – Without any awareness that other services exist • Stateless – Have no memory, do not remember state – Easy to scale • Request-response model – Client asks, server returns answer
  • 5. SOA Services • Communication through standard protocols – XML, SOAP, JSON, RSS, ATOM, ... – HTTP, FTP, SMTP, RPC, ... • Not dependent on OS, platforms, programming languages • Discoverable – Service registries
  • 6. SOA and Business Processes Management (BPM) • Composite applications – Assembled form a set of services combined to support a business process – Business agility • Allows quick reaction to changes • Business Process Management (BPM) – Composite applications support • Process orchestration, execution, monitoring and optimization
  • 7. Loose Coupling • Loose coupling – main concept of SOA • Loosely coupled components: – Exhibits single function – Independent of other functions – Through a well-defined interface • Loose coupling programming evolves: – Structural programming – Object-oriented programming – Service-oriented architecture (SOA)
  • 8. SOA and Web 2.0 • Moving to a "services model" – global IT trend for both: – Internet business – Inside an enterprise • Two main SOA scenarios – SOA in Internet • Software as service, Web 2.0, RIA, ... – SOA inside an enterprise • Heavy SOA stacks: WS-*, BPM, BPEL, WCF, SCA, ESB, ...
  • 9. Trends for service-orientation of the IT business
  • 10. SOA in Internet • Internet companies implement lightweight SOA in Internet – Also called WOA (Web-Oriented Architecture) – Examples: Google, Amazon, Facebook, ... – Tend to provide software as service – Based on lightweight Web standards: • AJAX and Rich Internet Applications (RIA) • REST, RSS, JSON, proprietary APIs
  • 11. SOA in Enterprises – Driven by business processes: BPM, BPMN, BPEL, ... – Enterprise application integration (EAI) – B2B integration – SOA based portals – Unified Frameworks: SCA and WCF – Enterprise Service Bus (ESB) – SOA governance (control)
  • 12. SOA Adoption • Why SOA adoption is slow? – SOA is a Customized Application technology • It is a better approach to IT – SOA is not a "buy" solution • It is a "build" solution • Purchasing a SOA platform product can not turn IT infrastructure to SOA – Slow migration trend to SOA • New software is build with SOA in mind • Old software is adopted to support SOA
  • 13. Obstacles in SOA Adoption • Obstacles to SOA adoption in enterprises – Need of new thinking for the IT – Resources, tasks, budgets and skills need to be shared across projects and not dedicated solely to a single project – Unclear return of investments (ROI)
  • 14. SOA Infrastructure Trends • Virtualization will impact SOA deployment • Computing clouds will impact SOA – Amazon and SalesForce already have "computing clouds" solutions • SOA scale-out infrastructures build on low- cost hardware adoption – Google, eBay, Amazon and PayPal already have such technology
  • 15. SOA Technology Trends • Adoption of SOA patterns and EAI patterns • Open source SOA products will get more market share • In Java world: increase of OSGi adoption • In Microsoft world: WCF adoption • Domain-specific languages for SOA • Adoption of lightweight technologies (REST, JSON, ...) will run in parallel with adoption of SOAP and WS-* technologies – Abstract APIs like WCF and SCA will emerge
  • 16. Assignment • Discuss in detail the general trends in SOA Adoption by Enterprise Business. • Thank You