Information Technology Reference
In-Depth Information
authorization to use a license, an application must have the certificate of an
authority. This certificate must be available locally to the application because
the application may be executed in an environment with restricted network
access. This opens up the possibility for an administrator to hijack the license
mechanism by exchanging the local certificate.
18.7 Summary
This chapter discussed issues related to cloudware operations and manage-
ment. It described the portfolio of core services (including discovery and
replication, load balancing, resource management, data governance, man-
agement services, and fault tolerance) and functionality (including Service
management, Metering/billing, Data management, monitoring, security
management, SLAs and QoS management, performance management, pol-
icy management, self-service, support and incident management, analytics,
orchestration, transformation, logging/audit trails, mediation, integration,
rules management, and semantic engine). It described metrics for interfac-
ing with service providers and, hence, criteria for their selection. In the last
part of the chapter, we discussed SLAs (Service Level Agreements) that assist
in evaluating the normalcy of ongoing operations.
Search WWH ::




Custom Search