Tag Archives: Cloud Computing

The Volume, Velocity, Variety, and Visualization of Big Data

What if We had More Big Data Artists in the World?

Today’s Big Data Scientists are being challenged with discovering actionable insights from the Volume, Velocity and Variety of data resources in cost-effective innovate ways. This is the foundation of Big Data Trends and has tremendous value when understanding is Visualized by today’s Big Data Artists.

Big Data Artists and Data Storytelling

Data comes to life in the hands of Data Artists.  Effective Data Storytelling can inspire new ideas and actions. Statistics guru Hans Rosling is a modern day Michelangelo of Big Data.  Watch his TED Talk video about “global trends in health and economics“.  Hans really gets rolling into this data story at about the 4 minute mark of this video.

Big Data Virtualization

Processing unstructured, semi-structured, and structured data can be accomplished with open-source tools such as Hadoop, MongoDB, Node.JS, with multiple programming languages including Java and Python. Many of these Big Data Tools can be installed and configured within a few minutes.  We can also leverage Cloud Computing for processing Big Data. Cost-effective processing of Graph Data for Social Network Analytics can be accomplished with GraphChi.  My friend and colleague, Brad Cox, created an easy to use plugin to accelerate graph data processing.  There are a plethora of tools and resources out there.  Help others and share your favorites here. Continue reading

Collection of Social Business Predictions & Tech Trends for 2012

The Future of Social Business & Enterprise 2.0

Many Things in Motion

The Collective Intelligence of Social Business

We are about to embark on an innovative journey that will transform the workforce.  This new innovation age will blur the lines of work and play.  Integrating internal and external Social Media into Enterprise workflows to support collaborative business intelligence will become more of a priority.  The future of Social Business will empower the workforce, partners, and customers in the process of co-creation that will drive new levels of innovation across multiple markets.  These new business models will begin to harness the power of Collective Intelligence as the Enterprise explores collaboration beyond it’s main silo, the firewall.

“The whole is greater than the sum of its parts.” – Aristotle Continue reading

Enterprise 2.0 App Stores: When Good Web 2.0 Apps Go Bad

Custom Dashboards in the Enterprise & Web 2.0 Apps

There’s an app for that!

The success of Apple’s iPhone App Store, Mac apps, and Google’s Marketplace all play a part in driving the trend of Enterprise 2.0 App Stores in business organizations of all sizes.  The idea of providing a solution with “There’s an app for that!” will be common place in the near future.  The App Store market will get very interesting when organizations and Government Agencies harness the true power of Service Oriented Architecture (SOA) & Cloud Computing.  This trend will help fuel the Federated System.  More information about Enterprise 2.0 App Store Architecture can be found here The 80-20 Rule for Web 2.0 Architecture in the Enterprise.

Where Do Apps Come From?

Custom Enterprise 2.0 Dashboards can include apps, widgets, and gadgets that include resources that are internal, external, and a combination of both.

  1. Internal Resources: Apps and their data that are hosted and maintained within the organization. The risk level is low.
  2. Internal and External Resources: There are usually internally created apps that use external data. The risk level is medium.
  3. External Resources: Apps that are hosted by third parties.  The trust relationship is complex and the risk level usually remains high.

How Are Apps Delivered?

Apps are added to devices and dashboards in multiple ways. App code and private data should reside in the client, but this is rarely the case.  Web 2.0 Apps are usually added to Enterprise 2.0 Dashboards by using the following technologies and methods.

What Are Application Security Risks?

Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.  The top 10 application security risks of 2010 can be reviewed on the Open Web Application Security Project (OWASP) web site here.  Additional Web Security information is available from the Open Ajax alliance at Ajax and Mashup Security.  The main rule of thumb is, “Never trust external data”.  Using a Proxy Server to fetch external data can help support the additional security requirements.  A proxy server is also helpful in capturing metrics of external resource usage.  The proxy server can integrated like an Enterprise Service Bus (ESB) to support the complex structure of Enterprise 2.0 App Stores.

What Happens When Good Web 2.0 Apps Go Bad?

How to Detect a Key Logger on Your System

Most people in the Web 2.0 World are familiar with the acronym WYSIWYG, “What You See is What You Get”.  This new acronym WYRIWYR, “What You Requested is What You Received” will be covered here.  The consumer and the producer should be focused on WYRIWYR.  Producers need to trust the consumer’s identity and consumers need to feel secure.

Data can be tampered with on either end and while in transit.

The Open Source Software Community frequently uses checksum to protect software integrity. This same strategy can be used to protect consumers from malicious apps and widgets.  This simplified example will use MD5 in PHP to check the integerity of the app, but MD5 should not be used for sensitive data like passwords in a production environment.  US-CERT of the U. S. Department of Homeland Security said MD5 “should be considered cryptographically broken and unsuitable for further use,” and most U.S. government applications will be required to move to the SHA-2 family of hash functions after 2010.

Simple App

Here is a very simple app that could be part of a custom Enterprise 2.0 Dashboard. The App is reviewed and approved. The reviewer signs the app (creates app MD5 Hash: c15a7308d89afe9218a1b0f60a37f8ad) so changes can be detected when it comes back through the proxy server.

Simple App in Proxy Server before Dashboard Display
Deliver app if new hash and signature match. Disable app and notify Admin if something does not look right.

The Simple App with Key Logger Script Injected

Happy Fav Five Friday!

Fav 5 Places

  1. Google Gadgets For Your Webpage
  2. ‘App store’ makes service orientation real for the business
  3. Global CIO: The Case For Copying Apple’s App Store
  4. Nexuo Enterprise Platform
  5. Enterprise Irregulars: Designing User Experience

The people from Open Social provides a great Introduction To Signed Requests

OpenSocial API provides a method to communicate OpenSocial ID numbers back to your server in a secure way, allowing for the construction of robust web service backed OpenSocial applications, using a portion of the OAuth authorization protocol.  This article will explain the method to make such secure requests from your OpenSocial applications, as well as the server-side process that you need to follow in order to verify that the data passed has not been tampered with.   Learn more here.

The 80-20 Rule for Web 2.0 Architecture in the Enterprise

Enterprise 2.0 Cloud Computing & Service Oriented Architecture (SOA)

Integrating Internet Principals In Your Intranet

80-20-Service-Oriented-Architecture-SOA

You may of heard someone in your office say something like “20% of the people are doing 80% of the work”.  This is known as The Pareto Principle, aka the 80-20 Rule.  This principal will also apply to the future architecture of the internet composed of 80% Consumers and 20% Producers supported by “Linked Data”  This paradigm shift in information architecture will be fuled by the adoption of using widgets, gadgets, and apps to connect information.

Enterprise 2.0 App Stores

  • What if you had an Enterprise 2.0 App created from SharePoint?
  • What if you had an Enterprise 2.0 App for email?
  • What if you had Enterprise 2.0 Apps for your team blog, wiki, graphs, activity streams, …?
  • What if all these apps were displayed as Widgets in your Enterprise 2.0 Dashboard?

Why would you log into all these different areas, when you can see what you want, how you want in a single place.  Navigating to multiple places is time consuming, even with Single Sign On (SSO) solutions in place.  Most Enterprise 2.0 Apps, Widgets, and Gadgets can be created with common web programming languages.  These web programming languages can be as simple as standard HTML, CSS, and JavaScript.  These User Interfaces can easily leverage AJAX and other Web 2.0 Technologies to enhance the User Experience.  The extra benefits of using these standard technologies is lower development cost, shorter time to deployment, and better support across multiple devices such as smart phones, iPads, and standard tablets.

Enterprise 2.0 App Store Architecture

Most organizations have a difficult time measuring the use of their Information Technology.  Some organizations can measure enough to know that moving at least some technology to the cloud makes sense.  Businesses can also realize the benefits from the concept of cloud computing through Enterprise 2.0 App Store Architecture.

What is an Enterprise 2.0 App?

An Enterprise 2.0 App is “a snippet of code that is shared to serve a specific purpose”.  This “App” can be displayed and used on smart phones, mobile devices, desktops, web browsers, dashboards, or other applications.

Where is the App Stored?

Apps can be stored internally or externally.

Internal Apps, Widgets, & Gadgets

Internal apps are hosted and used by the owner, usually in the same domain, therefore the level of trust is higher.

External Apps, Widgets, & Gadgets

External apps are hosted outside the domain and usually by a third party.  The level of trust is lower, therefore the proper security measures should taken.  All developers should know how to build, design and test the security of web applications and web services.

Using a Web Proxy

All modern web browsers impose a security restriction on network connections, which includes calls to XMLHttpRequest. This restriction prevents a script or application from making a connection to any web server other than the one the web page originally came from (Internet Explorer will allow cross-domain requests if the option has been enabled in the preferences). If both your web application and the XML data that application uses come directly from the same server, then you do not run into this restriction.  See the PHP Web Proxy code below and learn more about AJAX Web Proxies here.

<?php
// PHP Proxy example for Yahoo! Web services.
// Responds to both HTTP GET and POST requests
//
// Author: Jason Levitt
// December 7th, 2005
//

// Allowed hostname (api.local and api.travel are also possible here)
define (‘HOSTNAME’, ‘http://search.yahooapis.com/’);

// Get the REST call path from the AJAX application
// Is it a POST or a GET?
$path = ($_POST[‘yws_path’]) ? $_POST[‘yws_path’] : $_GET[‘yws_path’];
$url = HOSTNAME.$path;

// Open the Curl session
$session = curl_init($url);

// If it’s a POST, put the POST data in the body
if ($_POST[‘yws_path’]) {
$postvars = ”;
while ($element = current($_POST)) {
$postvars .= urlencode(key($_POST)).’=’.urlencode($element).’&';
next($_POST);
}
curl_setopt ($session, CURLOPT_POST, true);
curl_setopt ($session, CURLOPT_POSTFIELDS, $postvars);
}

// Don’t return HTTP headers. Do return the contents of the call
curl_setopt($session, CURLOPT_HEADER, false);
curl_setopt($session, CURLOPT_RETURNTRANSFER, true);

// Make the call
$xml = curl_exec($session);

// The web service returns XML. Set the Content-Type appropriately
header(“Content-Type: text/xml”);

echo $xml;
curl_close($session);

?>

You should also see this article: “Restricting Access to your AJAX Services“.

Open Source to the Rescue!

Open Source Libraries and Frameworks to Support Enterprise 2.0  Apps, Widgets, & Gadgets

Creating Enterprise 2.0 Apps, Widgets, and Gadgets can be less time consuming with these free open source libraries and frameworks.

jMaki

jMaki is a lightweight client/server framework for creating JavaScript centric Web 2.0 applications using CSS layouts, widgets widget model, client services such as publish/subscribe events to tie widgets together, JavaScript action handlers, and a generic proxy to interact with external RESTful web services. While jMaki abstracts much of the JavaScript and CSS by providing defaults for widgets, the JavaScript widgets and CSS are made easily accessible so they may be customized by a designer or page developer. jMaki focuses on the aspects of delivering JavaScript to the client allowing the JavaScript to communicate to various server-technologies including PHP, Java (JSP/JSF), and Phobos in a server-technology neutral way. Learn more here.

jmaki-architecture

Google Web Toolkit (GWT)

Google Web Toolkit (GWT) is a development toolkit for building and optimizing complex browser-based applications. Its goal is to enable productive development of high-performance web applications without the developer having to be an expert in browser quirks, XMLHttpRequest, and JavaScript. GWT is used by many products at Google, including Google Wave and the new version of AdWords. It’s open source, completely free, and used by thousands of developers around the world. Learn more here.

Screen shot 2011-01-14 at 2.52.57 AM

Enterprise 2.0 Widgets, Mashups, App Stores & Cloud Computing

Empowering E 2.0 Users with Enterprise App Stores

It’s exciting to see Enterprise 2.0 becoming more mature.  More Enterprise 2.0 vendors are focusing on standards and adopting Web 2.0 technologies.  This is actually very impressive when you think about Enterprise 2.0 was born in the Spring of 2006.  Andrew McAfee talks about the birth of E 2.0 in this article Enterprise 2.0 vs. SOA.  More Enterprise 2.0 solutions are also taking advantage of AJAX technologies to improve the user experience.  AJAX is a group of interrelated web development techniques used on the client-side to create interactive web applications.  We are also starting to see a trend for the use of Cloud Computing in the Enterprise.  Cloud Computing is proving itself as an approach to cutting IT costs while improving innovation.  You can read more about this in Dion Hinchcliffe’s article, “Enterprise cloud computing gathers steam“.  The big news for the Summer of 2010 in the world of Enterprise 2.0, is the release of Presto 3.0.  You can use Presto to empower people in the Enterprise with the ability to mix, match, and mash data into apps powering your own Enterprise App Store.

Power and Freedom through Enterprise Apps

The Presto Platform empowers application developers and power users to create, customize and share Enterprise Apps mashups for faster decisions and better business results. Presto provides a solution for every part of the Enterprise App lifecycle, from Services to Mashups to Apps to the App Store, while also meeting the toughest enterprise security and governance requirements. Equally important, Presto empowers your high-value employees to take advantage of your organization’s information assets – large applications like ERP, CRM, and SFA – and quickly marry them with external data sources such as Web services and news feeds to make better decisions from this disparate information.  [ Learn More ]

Presto Enterprise Apps

The App store model that Apple has proved so successfully with the iPhone is becoming the next frontier when it comes to next-generation software distribution. And it’s one that creates clear value for both customers and companies alike.” ~Dion Hinchcliffe @dhinchcliffe

Fav Five Faces

Here are just a few new friends that have connected me to new people and new ideas this week.  You might be familiar with “Fantasy Football Teams” and such, well this is my “Fantasy Innovation Team” this week.  I bet we would see some very innovative solutions, if this team worked together.

Who would be on your Fantasy Innovation Team this week?

twitter-ppk Mobile platform strategist, consultant, trainer, writer, blogger, and speaker. Mobile browser compatibility expert. http://twitter.com/ppk
twitter-ericaswallow Motivated, vivacious, bright-eyed, bushy-tailed, chocolate-obsessed social media enthusiast, loving life as an editorial assistant at @mashable http://twitter.com/ericaswallow
twitter-BillIves consultant and writer who helps firms and individuals with their blogs and other social media http://twitter.com/BillIves
twitter-deb_lavoy i think about how teams solve hard problems, coffee, chocolate and my kids. this annoys my husband. Gig: Dir, Prod Mktg.@OpenText for Social Workplace http://twitter.com/deb_lavoy
twitter-ellenfeaheny Integrations: Atlassian, E2.0, Alfresco, Fed Search, SCRM, etc – Eng. svcs & resales. Experts only, to fuel business – customer focused for good journeys… http://twitter.com/ellenfeaheny

Fav Five Places

OpenAjax Hub 2.0 Interactive Dashboard

Picture 6

How OpenAjax Hub 2.0 Addresses the Security Challenges

Picture 17

The launch of Jive Widget Studio

Picture 18

Opera Widgets and Ajax: Connecting to multiple servers

Picture 20

ZK Enterprise Framework

Picture 21