This document provides an overview of a 5-day course on service-oriented architecture (SOA). The course covers fundamental SOA concepts, SOA technology, design and architecture. It introduces SOA as a set of Lego blocks and discusses how SOA relates to enterprise architecture. The document outlines the course calendar and provides brief introductions to SOA certifications and reference materials.
This presentation will cover first exam of SOA , by introducing terms related to Service oriented Computing umbrella to start your knowledge base about Service Orientation world.
Enterprise Architecture linking to Chess and Lego games , and main capabilities of EA framework , concentrating on Togaf as common Enterprise architecture framework.
When a company invests in ITIL, very often Architecture is not much involved: this is a mistake because there is much overlap, and Architecture can end up side-lined by the ITIL juggernaut. But there are a lot of benefits Architecture can bring to an ITIL-oriented organization.
This slide deck goes a step or two further than the white-papers out there I've found to date in providing some concrete guidance on how to actually integrate Architecture activities into ITIL. The deck uses TOGAF as the reference framework, but the concepts can be applied to any modern Architecture practice, since the discussion focuses on the types of deliverables and activities, which analogously exist in most frameworks.
This whitepaper considers the alignment of ITSM within a TOGAF aligned enterprise.
A key driver for having such an alignment is to remove the business execution silos that come to exist in an enterprise when implementing projects that fall under either ITIL 3 or TOGAF 9. At a high level, we propose to remove such silos by creating a mapping between the two frameworks as well as between ITSM and TOGAF 9. This should create a standard set of artifacts or standard interfaces between those artifacts so that an enterprise may have a common platform for both service management and enterprise architectures. Such commonality is best implemented at the initial requirements establishment phase of an initiative and so the necessary information sharing and processes should be in place at the outset.
Our recommendation is for this to happen within the wider TOGAF 9 context where ITIL 3 can be considered as an integral extension of enterprise architecture. This is achievable because there is a lot of synergy between ITSM’s ITIL 3 and the TOGAF 9 framework, especially since TOGAF 9 has shifted to a more service-orientated approach to Enterprise Architecture.
This presentation will cover first exam of SOA , by introducing terms related to Service oriented Computing umbrella to start your knowledge base about Service Orientation world.
Enterprise Architecture linking to Chess and Lego games , and main capabilities of EA framework , concentrating on Togaf as common Enterprise architecture framework.
When a company invests in ITIL, very often Architecture is not much involved: this is a mistake because there is much overlap, and Architecture can end up side-lined by the ITIL juggernaut. But there are a lot of benefits Architecture can bring to an ITIL-oriented organization.
This slide deck goes a step or two further than the white-papers out there I've found to date in providing some concrete guidance on how to actually integrate Architecture activities into ITIL. The deck uses TOGAF as the reference framework, but the concepts can be applied to any modern Architecture practice, since the discussion focuses on the types of deliverables and activities, which analogously exist in most frameworks.
This whitepaper considers the alignment of ITSM within a TOGAF aligned enterprise.
A key driver for having such an alignment is to remove the business execution silos that come to exist in an enterprise when implementing projects that fall under either ITIL 3 or TOGAF 9. At a high level, we propose to remove such silos by creating a mapping between the two frameworks as well as between ITSM and TOGAF 9. This should create a standard set of artifacts or standard interfaces between those artifacts so that an enterprise may have a common platform for both service management and enterprise architectures. Such commonality is best implemented at the initial requirements establishment phase of an initiative and so the necessary information sharing and processes should be in place at the outset.
Our recommendation is for this to happen within the wider TOGAF 9 context where ITIL 3 can be considered as an integral extension of enterprise architecture. This is achievable because there is a lot of synergy between ITSM’s ITIL 3 and the TOGAF 9 framework, especially since TOGAF 9 has shifted to a more service-orientated approach to Enterprise Architecture.
The event had a choice of several relevant workshops ITIL & Service Delivery based. Typically each session was hosted by two expert IT Practitioners and with a class size of no more than 10 delegates for Workshops and 20 delegates for Master Classes. The class size was designed to allow engagement with both the experts and other delegates.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
Overview on the Practical Enterprise Architecture approach using TOGAF ADM for architectures development, Zachman Framework as artifacts repository and Sparx EA as a modelling tool.
Togaf is a high level and holistic approach to design, which is typically modeled at four levels: business, application, data, and
technology. It tries to give a well-tested overall starting model to information architects, which can then be built upon. It relies heavily
on modularization, standardization, and already existing, proven technologies and products.
For More Information please follow the below link:
http://www.xoomtrainings.com/course/togaf
For Togaf 9.1 Online Training Demo Please Find the below link:
https://www.youtube.com/watch?v=TF-h6yUc9eo
For General Queries Email us at sales@xoomtrainings.com or +1-610-686-8077
Enterprise Architecture - An Introduction from the Real World Daljit Banger
The attached slides where presented at a BCS EA SIG organised event hosted by Deloitte in Edinburgh on the 24th April 2017.
Slide 7 is not rendered as I wish to protect the IP, however will publish soon
Introduction to Enterprise Architecture and TOGAF 9.1iasaglobal
Santos Pardos nos dará una visión general a TOGAF. Durante 2 horas, Santos nos introducirá al mundo de The Open Group Architecture Framework (TOGAF), ese marco de trabajo de Arquitectura Empresarial que muchos escuchamos hablar. Nos contará el enfoque propuesto para el diseño, planificación, implementación y gobierno de una arquitectura empresarial de información. También repasará, a alto nivel, cuatro niveles o dimensiones: Arquitectura de Negocios Arquitectura de Aplicaciones Arquitectura Tecnológica Arquitectura de Dat
The event had a choice of several relevant workshops ITIL & Service Delivery based. Typically each session was hosted by two expert IT Practitioners and with a class size of no more than 10 delegates for Workshops and 20 delegates for Master Classes. The class size was designed to allow engagement with both the experts and other delegates.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
Overview on the Practical Enterprise Architecture approach using TOGAF ADM for architectures development, Zachman Framework as artifacts repository and Sparx EA as a modelling tool.
Togaf is a high level and holistic approach to design, which is typically modeled at four levels: business, application, data, and
technology. It tries to give a well-tested overall starting model to information architects, which can then be built upon. It relies heavily
on modularization, standardization, and already existing, proven technologies and products.
For More Information please follow the below link:
http://www.xoomtrainings.com/course/togaf
For Togaf 9.1 Online Training Demo Please Find the below link:
https://www.youtube.com/watch?v=TF-h6yUc9eo
For General Queries Email us at sales@xoomtrainings.com or +1-610-686-8077
Enterprise Architecture - An Introduction from the Real World Daljit Banger
The attached slides where presented at a BCS EA SIG organised event hosted by Deloitte in Edinburgh on the 24th April 2017.
Slide 7 is not rendered as I wish to protect the IP, however will publish soon
Introduction to Enterprise Architecture and TOGAF 9.1iasaglobal
Santos Pardos nos dará una visión general a TOGAF. Durante 2 horas, Santos nos introducirá al mundo de The Open Group Architecture Framework (TOGAF), ese marco de trabajo de Arquitectura Empresarial que muchos escuchamos hablar. Nos contará el enfoque propuesto para el diseño, planificación, implementación y gobierno de una arquitectura empresarial de información. También repasará, a alto nivel, cuatro niveles o dimensiones: Arquitectura de Negocios Arquitectura de Aplicaciones Arquitectura Tecnológica Arquitectura de Dat
this series of Service-oriented computing will explain in details session after another , the core knowledge about service orientation , so be ready ..
PECB Webinar: Aligning ITIL/ISO 20000 Service Design and TOGAF Enterprise Arc...PECB
Summary:
The ITIL Service Design stage specifies 8 key IT processes that organizations need to excel at, if they are to develop effective designs for their IT ecosystem.
TOGAF is an Enterprise Architecture Model that takes a holistic and integrated look at how architectures are conceptualized and implemented.
To get Service Design right means the individual/organizations has to have some sort of knowledge and experience in the use and adoption of TOGAF.
IT Projects go wrong in the Service Design stage and they further go wrong because they lack the rigor that an enterprise architecture brings into play.
In this webinar we will explore the following:
• The very heart of ITIL Service Design
• The 8 Design Process
• TOGAF Introduction
• Architecture Development Lifecycle
• IT Infrastructure and Application Design Issues
• The Link between Service Design, Enterprise Architecture and IT Implementation
Presenter:
Orlando is an Enterprise Architect and Programme Director with over 15 years’ experience in the field of Computing and Information Technology Consulting. He has an excellent technical background and has carried out Project Management, Service Management, Assurance, Advisory and System Integration Projects within SAP, Microsoft, Oracle, HP, Cisco and other solution areas of Information Technology. He has led more than 100 successful engagements for clients over the past 15 years. Orlando has developed various documentation for Enterprise Architecture, IT Service Management, CRM Implementation and Information Security. He has also trained over 2, 000 Professionals on (ITIL, TOGAF, Business Analysis, COBIT, CMMI, XBRL, ISO 20000, ISO 27001 and ISO 22301).
Lesen Sie hier die aktuelle Studie der CRIMSON Consulting Group zum Thema "Oracle SOA vs. IBM SOA" . Einschätzung der Komplexität und des Mehrwerts aus Kundensicht.
Business and IT leaders are understandably reluctant to retire considerable, legacy investment in technology, people, and processes due to security, risk, and regulatory compliance obligations. This creates a hybrid IT deployment model: an on-premise landscape of existing or legacy systems and off-premise cloud deployment of suitable IT capability.
The ODCA believes that integration of cloud deployments with enterprise landscapes should consider people, process, technology, and operating models. Doing so encourages faster cloud adoption, leverages existing enterprise investments in IT landscape and helps govern safe cloud adoption through effective risk and compliance management.
Watch webinar on-demand at https://www.brighttalk.com/channel/9831
Download “Cloud Coexistence with Extant Enterprise Systems,” a whitepaper published by ODCA and top member companies.
Architecture thinking series W001 - present architecture discipline including integrated domains ( business strategy , business architecture and enterprise architecture)
and basic concepts behind Architecture Thinking
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
4. Course Calendar
Day 1 : Fundamental SOA & Service-Oriented Computing
Day 2 : SOA Technology Concepts
Day 3 : SOA Design & Architecture
Day 4 : Advanced SOA Design & Architecture
Day 5 : SOA Design & Architecture Lab
5. Quick Introduction
▷SOA As a Lego box
▷Arcitura Schools
▷SOA Certifications
▷SOA Architecture Certification Matrix
▷SOA Book Series
7. SOA & EA
▷Overall construction of the enterprise
▷Includes much more than IT than IT
▷Covers business operations, finance,
people, buildings and technology
▷Particular construction technique
to build enterprise IT
▷Part of the enterprise architecture
▷Major impact on the overall construction
16. Session Agenda
1. Fundamental Service-Oriented Computing Terms
2. Strategic Goals of Service-Oriented Computing
3. SOA and service Orientation
4. Planning and Governing SOA
5. SOA Project Delivery Approaches and Planning
6. Primitive service modeling process
18. Service Oriented Computing
New generation distributed computing platform include:
▷Its own design paradigm (principles)
▷Design pattern catalogs
▷Pattern languages
▷ A distinct architectural model,
▷Related concepts, technologies, and frameworks.
Big umbrella in the
world of services
Builds upon past distributed computing platforms and adds :
▷New design layers
▷Governance considerations
▷Set of implementation technologies.
23. Service - Capability
▷A service is a container for a collection of related functions.
These functions are called service capabilities
▷Capabilities exposed via a service contract establish a basic API by which the service
can be invoked.
▷Capabilities Useful during service modeling stages when physical design
of a service has not yet been determined.
Once it is known whether a service exists as a Web service
or as a component, the terms "service method" or “
service operation" can be used instead
25. Service Composition
▷An aggregateof services collectively composed to automate a particular task
or business process.
▷To qualify as a composition, at least two participating services plus
one composition initiator need to be present.
▷service naturally and repeatedly composed is fundamental
to attaining several of key strategic goals of
service-oriented computing.
▷Service-orientation design paradigm revolves around
preparingservices for effective participation
in numerous complex compositions.
28. Service Orientation Solution logic
▷The application of Service Orientation principles to the design of solution logic
results in service-oriented solution logic
▷Service-oriented solution logic is implemented as services and service compositions
Principles
Goals
Service
Composition
Service
Solution
Logic
29. Solution logic – Real World Example
MOI Electronic Service Solution (Absher)
33. Service Orientation Principles
Service Reusability
Service contain agnostic logic that can be position as reusable enterprise resource.
Standardized Service Contract
Service in same inventory are in compliance of same design service contract standards.
Service Composition
Services are effective composition participants.
Service Discoverability
Service meta data available for discoverability and interpreted.
34. Service Orientation Principles – cont.
Service Loose Coupling
Contract decoupled from surrounding environment.
Service Autonomy
Services exercise a high level of control over underlying runtime execution environment.
Service Statelessness
Services minimize resource consumption , reduce state information.
Service Abstraction
Contract contains only essential information , that is published to consumers.
36. Architecture Definition
Definition 2
Structureof components, their inter-relationships, and principles and
guidelines governingtheir design and evolution over time
Definition 1
Formal Description or Detailed plan Of system at component level
to guide its implementation
37. Service Orientated Architecture
▷SOA establishes an architectural model that aims to enhance the efficiency, agility, and
productivityof an enterprise
▷SOA Position services as primarymeans through which solution logic is represented in
support of realization of strategic goals associated with service-oriented computing.
▷Service-oriented computing revolves around service-orientation design paradigm
and its relationship with service-oriented architecture.
38. Service Orientated Architecture
SOA Implementation can consist of
▷Technologies
▷Products
▷APIs
▷Supportinginfrastructureextensions
▷Various other parts
40. Service Inventory
▷collection of complementaryservices within a boundary that represents an
enterprise or a meaningful segment of an enterprise
▷Service inventories are typically created through top-down delivery processes that
result in the definition of service inventory blueprints.
42. Service Inventory (Blueprint)
Service Inventoryblueprints is a Collection of Candidate services in analysis phase
that need to analyzed and refined as necessary before committing to the actual
creation of a physical service inventory
Classification used to indicate that a service belongs to one of several predefined
types based on the nature of the logic it encapsulates
43. Service layers – Entity Service
▷Reusable service with an agnostic functional context
▷associated with one or more related business entities
44. Service Models – Utility Service
▷Reusable service with an agnostic functional context
▷Not retrieved from business encapsulates low-level
technology-centric functions
▷ such as notification, logging, and security processing.
45. Service Models – Task Service
▷A service with a non-agnostic functional context
▷Generally correspondsto single-purpose
▷A task service will usually encapsulate the compositionlogic
49. Service Oriented Computing Goals
Increased Intrinsic Interoperability
Service designed to be naturally compatible, no effort need for integration
Integration VS
Interoperability
50. Service Oriented Computing Goals
Increased Federation
Services establish a uniform contract layer hides underlying difference
51. Service Oriented Computing Goals
Increased Vendor Diversification Options
A vendor-neutral architectural model organization to evolve the architecture
without limited to proprietary vendor platform characteristics
52. Service Oriented Computing Goals
Increased Business and TechnologyDomain Alignment
services are designed with a business-centric functional context alignment with the business,
even as the businesschanges
53. Service Oriented Computing Goals
Increased Return on Investment (ROI)
Services are delivered and viewed as IT assets expected to provide repeated value, that will
cover exceed cost of delivery and ownership
54. Service Oriented Computing Goals
Increased Organizational Agility
Rapid delivery , New and changing business requirements can be fulfilled rapidly
55. Service Oriented Computing Goals
Reduced IT Burden
providing more value with less cost and less overall burden reduced waste and
redundancy, reduced size and operational cost
56. Service Oriented Computing Goals
Increased Return on Investment (ROI)
Services are delivered and viewed as IT assets expected to provide repeated value, that will
cover exceed cost of delivery and ownership
Increased Organizational Agility
Rapid delivery , New and changing business requirements can be fulfilled rapidly
Increased Intrinsic Interoperability
Service designed to be naturally compatible, no effort need for integration
Increased Business and TechnologyDomain Alignment
services are designed with a business-centric functional context alignment with the business,
even as the businesschanges
Reduced IT Burden
providing more value with less cost and less overall burden reduced waste and
redundancy, reduced size and operational cost
Increased Federation
Services establish a uniform contract layer hides underlying difference
Increased Vendor Diversification Options
A vendor-neutral architectural model organization to evolve the architecture
without limited to proprietary vendor platform characteristics
57. SOA and Service Orientation
▷SOA Characteristics
▷ Four Common Types of SOA
58. SOA Characteristics
Always align between technology
architecture and business needs
Business driven Vendor Neutral
Leveragingmultiple vendor
technology innovations
Composition centric
services capable of being pulled
into a variety of composition
Enterprisecentric
Enterpriseresource is simply
logic positioned as an IT asset
60. SOA Characteristics – Business Driven
Traditional technology architecture
For solutions delivered to fulfill tactical (short-term)business requirements
Result :
▷Technical environment, over time, falls out of
alignment with organization's business direction
and requirements
▷Increasingly difficult to adapt to
changing business needs
61. SOA Characteristics – Business Driven
Business driven technology architecture
Business vision, goals, and requirements are positioned as the basis for and
the primaryinfluence of the architectural model.
Result :
▷maximizes the potential alignment of
technology and business
▷continual increase in the value and life span of
the architecture.
▷constant sync with how the business evolves
over time.
63. SOA Characteristics – Vendor Neutral
Vendor-centric technology architectures :
Bound to correspondingvendor platform Roadmaps
Result :
▷Reduce opportunities to leverage technology
innovations provided by other vendor platforms
▷Need to eventually replace the architecture
entirely with a new vendor implementation
64. SOA Characteristics – Vendor Neutral
neutral vendor platforms
Result :
▷freedom to diversify its implementation by
leveraging multiple vendor technology
innovations.
▷Increases the longevity of the architecture
▷Architecture evolve in response to changing
requirements
66. SOA Characteristics – Enterprise Centric
Single-purpose services
Delivered to automate specific business processes
Result :
Can end up establishing silos within the enterprise.
67. SOA Characteristics – Enterprise Centric
Enterprisecentric services
Enterpriseresource is simply logic positioned as an IT asset
Result :
Extension of the enterprise that does not belong solely to any one application or solution
69. SOA Characteristics – Composition Centric
▪ Service built as flexible resources
that plugged into different aggregate
structures
▪ services must be capable of being pulled
into a variety of composition designs,
regardless of whether or not they are
initially required to participate in a
composition when they are first delivered
71. Four Common Types of SOA
▷Service-oriented technology architecture can exist at different scopes or levels of implementation
▷These implementation levels are referredto as SOA types.
1. Service Architecture : The architecture of a single service
2. Service Composition Architecture : the architecture of a
set of services assembled into a service composition
72. Four Common Types of SOA
▷These implementation levels are referredto as SOA types.
3. Service InventoryArchitecture : the architecture that
supports a collection of related services that are
independently standardized and governed
4. Service-Oriented EnterpriseArchitecture:
The architecture of the enterprise itself, to whatever
extent it is service-oriented
73. Planning and Governing SOA
▷Four Pillars of Service Orientation
▷Levels of organizational maturity
74. Planning and Governance of SOA
▷SOA adoption require a long-term commitment that can demand essential rethink of an
organization’s business and the culture, technology, and priorities of its IT enterprise
▷The following models and practices assist an organization in assessing its readiness and
maturity, and formalizing the manner in which the resources and assets produced by an SOA
project are regulated and evolved
1. Four Pillars of Service Orientation
2. Level of Organizational Maturity
76. 1. Pillars of Service-Orientation
▷Teamwork : Cross-project teams and cooperation are required.
▷Education : Team members must communicate and cooperate based on common
knowledge and understanding.
▷Discipline : Team members must apply their common knowledge consistently.
▷Balanced Scope : The extent to which the required levels of
Teamwork, Education, and Discipline need to be realized is
represented by a meaningful yet manageable scope
Good understanding of how these pillars represent
foundational requirementsfor successful SOA adoption
enables an organization to properlyscope its adoption effort
78. 2. Levels of organizational maturity
▷Organization begins planning for the adoption of SOA
▷ Organization transition throughone or more of the following common evolutionary
levels:
79. Levels of organizational maturity
Service Neutral Level
No meaningful extent of teamwork, education, or discipline has been established
or yet identified
80. Levels of organizational maturity
Service Aware
Four pillars have been established, relevant business requirements and goals are
defined, and overall necessary organizational foundation for the SOA initiative is in place.
81. Levels of organizational maturity
Service Capable
Ability to deliver and govern services and service compositions in response to
business automation requirements
82. Levels of organizational maturity
Business Aligned
Organization has successfully aligned services and service compositions with the
current state of the business.
service inventory have been delivered and are in operation (mature service inventory)
83. Levels of organizational maturity
Business Driven
service-encapsulated technology resources are not just aligned with the current
state of the business, but have proven to remain in alignment with how business
requirements continue to change
84. Levels of organizational maturity
Service Ineffectual
IT enterprise delivers services as silo-based or bottom-up automation solutions
under the pretense that it is adopting SOA.
(most likely single-purpose software programslabeled as services)
85. Levels of organizational maturity
Service Aggressive
Generation of services that the business doesn't want or need , business may
not even be aware of their existence.
Due to lack of teamwork or education or discipline , the SOA initiative fails to
align its technology in support of the business.
86. SOA Project Delivery Approaches
and Planning
▷Top-down Approach
▷Bottom-up Approach
▷meet-in-the-middle Approach
▷Project and Lifecycle Stages
▷Service Oriented Analysis
▷Service oriented Design
88. SOA Project Delivery
Choosing a delivery approach is a critical decision
point because it represents a decision an organization
will usually need to live with for quite some time.
There are different project delivery approaches :
▷Top-down Approach
▷Bottom-up Approach
▷Meet-in-the-middle
89. Bottom-up approach
▷Tactically focused in that it makes the fulfillment of immediate business requirements a
priorityand the prime objective of the project.
Pros and Cons :
▷Avoids extra cost, effort, and time required to deliver services via a top-down approach
▷Increased governance burden as bottom-up delivered services tend to have shorter
lifespans and require more frequent maintenance ,refactoring, and versioning.
90. Top-down approach
▷Represent Spectrum Strategyview for enterprise.
▷Advocates the completion of an inventory analysis priorto the physical design,
development, and delivery of services.
Pros and Cons :
▷ Demands more of an initial investment because it introduces an up-front analysis
stage focused on the creation of the service inventory blueprint.
▷Service candidates are individually defined as part of this blueprint so as to ensure
that subsequent service designs will be highly normalized , standardized ,and
aligned.
91. meet-in-the-middle Approach ( Agile Delivery)
▷Allows for an on-going analysis and definition of a service inventory blueprint, while
high-priorityservices are delivered in advance
▷At a later point, after the analysis efforts have sufficiently progressed,services that
have been previously deployed are revisited
Pros and Cons :
▷If necessary, they are then redeveloped and brought in alignment with the revised
blueprint.
93. Project and Lifecycle Stages
1. SOA Adoption Planning
2. Service InventoryAnalysis
3. Service-Oriented Analysis (Service Modeling)
4. Service-Oriented Design (Service Contract)
5. Service Logic Design
6. Service Development
7. Service Testing
8. Service Deployment and Maintenance
9. Service Usage and Monitoring
10.Service Discovery
11.Service Versioning and Retirement
Common and primarystages related to SOA projects and the overall service lifecycle:
http://serviceorientation.com/soaproject/projectlifecycle
97. Primitive Service modeling process
Organize large amount of units of logic so
that they can be reassembled into
service-oriented solutions.
Group and categorize these units
according to the nature of their logic.
Focus on following SOA principles
1. Service reusability
2. Service composability
98. Primitive Service modeling process
Service
encapsulation
2
Non – agnostic
context
5
Agnostic
capability
4
Functional
decomposition
1
Agnostic
Context
3
99. process modeling [1. Functional decomposition]
Purpose : How can a large business problem be solved without having to build a
standalone body of solution logic?
Solution :
▪ To apply service-orientation, we first must break down a business process by
functionally decomposing it into a set of desirable actions
▪ Functional decomposition is Application of the separation of concerns theory.
100. process modeling [1. Functional decomposition]
Impacts :
▷ Require attention on interconnectivity, security, reliability, and maintenance
between distributed solution logics
▷ If the quality of the business process definition is poor, then the resulting
concerns will form a weak foundation for subsequent service definition.
Relationships :
▷ Functional Decomposition forms the basis for all of the patterns
▷ Prepares the concerns that are subsequently addressed by solution logic that
begins to take shape with the application of Service Encapsulation
101. process modeling [2. service encapsulation]
Purpose : How can solution logic be made available as a resource of the enterprise?
Solution :
▪ Solution logic can be encapsulated by and exposed as a service (positioned as enterprise resource)
▪ Solution logic capable of functioning beyond the boundary for which it is initially delivered
▪ enterprise where individual solutions use logic encapsulated as services and vice versa ( as shared
services )
102. process modeling [2. service encapsulation]
Application : ( identify solution logic that can be encapsulate)
▪ Does logic contain functionality useful to parts of the enterprise outside of the current
application boundary? ( if yes , logic increased value potential to be enterprise resources )
▪ Does logic designed to leverage enterprise resourcesalso have the potential to become an
enterprise resource? ( after agnostic logic is initially separated , it will be clear if new logic can
leverage existing enterprise resource , if so , some or all of its functionality can also be
positioned as an enterprise resource)
▪ Does implementation of logic require hard
constraints that make it impractical or
impossible to position logic as an effective
enterprise resource?
(may be real-world limitations prevent
from being encapsulated as a service)
103. process modeling [2. service encapsulation]
If service-orientation design principles cannot be applied to a meaningful extent,
then logic not likely justify for service encapsulation
Relationships :
▪ For encapsulated solution logic to become effective member of service inventory, it needs
to be further shaped by other patterns and principles
▪ Encapsulated solution logic subsequently grouped into
• Single service ( non-agnostic context) [ entity – utility]
• OR multi-purpose services ( Agnostic context) [ task – orchestration ]
104. process modeling [3. agnostic context]
Purpose : How can multi-purpose service logic be positioned as an effective enterprise resource?
Solution :
▪ Isolate logic that is not specific to one purpose into separate services with distinct agnostic
contexts
▪ positions reusable solution logic at an enterprise level
▪ Apply service reusability principle
105. process modeling [3. agnostic context]
Application :
▪ Subset of the solution logic being further decomposed and then distributed into services with
specific agnostic contexts
▪ Agnostic logic is defined and continually refined into a set of candidate service contexts.
▪ form the basis of Entity Abstraction and UtilityAbstraction
Impacts :
▪ Increase quantity of services required to solve a
given problem
▪ Leads to additional design considerations and
performance overhead associated with service
compositions.
▪ The governance effort increased
▪ Also the governance of the overall architecture is also
impacted as the quantity of agnostic services
within an inventory grows.
106. process modeling [3. agnostic context]
Relationships :
▪ Closest relationship is between Agnostic Context and Agnostic Capability
▪ Other patterns apply specialized variations on agnostic context such as Entity
Abstraction and Utility Abstraction
107. process modeling [4. agnostic capability]
Purpose: How can multipurpose service logic be made effectively consumable and composable ?
Solution : Agnostic service logic is partitioned into a set of well-defined capabilities that address
common concerns not specific to any one problem
108. process modeling [4. agnostic capability]
Relationships :
Considered a continuation of Agnostic Context
111. process modeling [4. agnostic capability] Sample
Service definitions, each with capabilities that address processing
requirements of specific business process
After furtherservice modeling, the definitions
are refined with agnostic capabilities.
112. process modeling [5. non-agnostic context]
Purpose : How can single-purpose service logic be positioned as an effective enterprise resource?
Solution :
Non-agnostic solution logic suitable for service encapsulation can be located within services
that reside as official members of a service inventory
113. process modeling [5. non-agnostic context]
Application :
▷ Non-agnostic service logic is shaped via the same governing design principles as agnostic
Services
▷ Most commonly applied in combination with Process Abstraction
▷ No rules as to whether this pattern should be applied before or after Agnostic Context
Impacts :
▷ Initial delivery will be more expensive and
more time-consuming
▷ The ultimate ROI can therefore be significantly
lower than with agnostic services
114. process modeling [5. non-agnostic context]
Relationships :
Non-Agnostic Context is subsequent to Service Encapsulation
Based on task-centric service models so major relation with process abstraction and
process centralization patterns
115. process modeling [5. non-agnostic context]
After applying Process Abstraction :
117. Review Day 1
TERMS
Service oriented
computing
Service orientation Service oriented
architecture
Solution logic Service Service candidate
Service capability Service capability
candidate
Service composition
Service inventory Interoperability integration
Service model Entity service Utility service
Task service Business-centric Vendor-neutral
Enterprise-centric Composition-centric
118. Question-1
Which of the following statements is false?
A. A service is a unit of logic to which service-orientation has been applied to
a meaningful extent.
B. Services are designed to increase the need for integration.
C. Services are the fundamental building blocks of service-oriented solutions.
D. A service composition is comprised of services.
Answer : B
119. Question-2
A __________ can be part of a/an __________ which can be assembled from __________
within a/an
__________.
A. component, object, enterprises, service
B. service inventory, service, enterprises, service composition
C. service, service composition, services, service inventory
D. service inventory, service, service compositions, enterprise
Answer : C
120. Question-3
Services are ideally designed to be:
A. agnostic and reusable
B. unidirectional and semi-granular
C. linear and logistically decomposable
D. returnable and non-standardized
Answer : A
121. Question-4
Service Autonomy, Service Statelessness, and Service Loose Coupling are
examples of:
A. service-oriented architecture types
B. service-orientation design principles
C. service models
D. none of the above
Answer : B
122. Question-5
Service A invokes Service B. Service B invokes Service C. Service C
invokes both Service D and Service A.
In this runtime scenario, which services are acting as service consumers?
A. Service A, Service B, Service C
B. Service D, Service E
C. Service A
D. None, because a service cannot also be a service consumer.
Answer : A