REVIEW: "Cloud Application Architectures", George Reese
- BKCLAPAR.RVW 20091009
"Cloud Application Architectures", George Reese, 2009,
%A George Reese
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%G 978-0-596-15636-7 0-596-15636-7
%I O'Reilly & Associates, Inc.
%O U$29.99/C$29.99 707-829-0515 fax: 707-829-0104 nuts@...
%O Audience i- Tech 1 Writing 1 (see revfaq.htm for explanation)
%P 189 p.
%T "Cloud Application Architectures"
The preface states that this book is intended to prepare your Web
applications to succeed in the cloud, although it hasn't said what the
cloud is, nor is the example used particularly clear about what goes,
or went, on.
Chapter one attempts to define cloud computing, but does so in a
highly promotional, and not particularly useful, manner. If you can
use any browser, any operating system, and any Internet access
provider to use a service, that's cloud computing. (Does this mean my
local library's online catalogue is a cloud?) Later the material also
mentions pay-as-you-go services, as well as distributed storage and
processing. A large section provides an overview of the AWS (Amazon
Web Services) system. More detail on AWS is given in chapter two,
although the explanations are not very clear. (This may be in part
because Reese does not fully understand some of them: his outline of
the use of public/private key pairs makes no sense unless Amazon
intends to allow a serious attack on the operations controlled by its
accounts.) (It's fairly clear that this book was rushed to market in
order to take advantage of the current interest in cloud computing: so
fast that they forgot a number of the illustrative figures.) Chapter
three provides some guidance in regard to calculating costs and
reliability: the examples are from AWS, but the formulae and process
are the same as for any information system. The advice on preparing
your application for a scalable and distributed environment, in
chapter four, is confusing. A wide range of technologies are
addressed, and there is so much hedging and backtracking that it is
very difficult to determine which suggestion the author actually
wishes to stress, in the end. In terms of security, chapter five
suggests you encrypt your data, harden your applications, and then
describes some aspects of Amazon's operations. Disaster recovery
appears to some to be inherent in cloud computing, but chapter six
notes that you still have to do all the same disaster planning work,
with the proviso that some things you want to do AWS won't let you.
Chapter seven says you can buy more cloud as you need it.
This book provides relatively little in terms of architectural
guidance. It does promote AWS at every turn, and describes some of
the functions and API (Application Programming Interface) calls for
copyright Robert M. Slade, 2009 BKCLAPAR.RVW 20091009
====================== (quote inserted randomly by Pegasus Mailer)
rslade@... slade@... rslade@...
For the time will come when men will not put up with sound
doctrine. Instead, to suit their own desires, they will gather
around them a great number of teachers to say what their itching
ears want to hear. - II Timothy 4:3