ServiceTechMag.com > Issue XCVI, Q1/2017
Download Issue
Download Full Service Technology Magazine PDF

After a Decade, the Final Issue!

Thomas Erl

Thomas Erl

The Service Technology Magazine was launched in 2006, at which time it was called the SOA Magazine. It was renamed in 2011 to reflect the broadening scope of my book series with Prentice Hall. Over the past decade we published 96 issues authored by 242 contributors from around the world. These publications covered a diverse range of topics, discussion points and commentary that I hope have served as useful resources for the IT community. With this final issue we will be retiring the magazine, not due to lack of interest or popularity, but simply as a result of having to prioritize commitments. Arcitura Education has grown overwhelmingly this past year and it has become clear that the demands of maintaining that growth and the continuous development of its curricula will consume all available bandwidth. Thank you to all the great contributors that made the magazine what it was by giving it constant relevance and substance. Thank you to the loyal readership that followed the magazine for so many years. It’s been a privilege being part of realizing such a solid body of work. The previously published articles will remain archived on this Website for the foreseeable future.

Do You Know Where Your Privileged Accounts Are?

Dean Weich

Dean Weich

Enterprises of all industries, types and sizes are adopting and enforcing "least privilege" practices for account management, but privileged accounts will always be necessary and intrusion attempts are only increasing. If you must have a set of "keys to the kingdom," where do you hang them? "Least privilege" is a fundamental access governance (AG) concept. It ensures that Tim in marketing cannot access the accounting department's files. If you ask yourself, "Does my employee need X?" and the answer is "no" remove that access. However, IT admins, C-level executives, some managers and service and application accounts all require some higher-level access rights to fulfill various role functions. If an employee ever needs to pop the hood for an enterprise's systems or operations, they will need a privileged account. For the purpose of this article, privileged accounts can be separated into two types: high- and low-visibility. High-visibility privileged accounts are those...


Analysis & Modeling with Web Services and Microservices

Service-Oriented Architecture: Analysis & Design for Services and Microservices (2nd Edition)

Service-Oriented Architecture: Analysis & Design for Services and Microservices (2nd Edition)

This chapter provides a detailed step-by-step process for modeling Web service candidates. A service modeling process can essentially be viewed as an exercise in organizing the information we gathered in Steps 1 and 2 of the parent service-oriented analysis process that was described in Chapter 4. Figure 6.1 provides a generic service modeling process suitable for Web services that can be further customized. This chapter follows this generic service modeling process by describing each step and further providing case study examples. Figure 6.1 – A sample service modeling process for Web services. TLS outsources a number of its employees on a contract basis to perform various types of specialized maintenance jobs. When these employees fi ll out their weekly timesheets, they are required to identify what portions of their time are spent at customer sites. Currently, the amount of time for which a customer is billed is determined by an A/R clerk who manually...


2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006