-
The Journey to Serverless Migration: An Empirical Analysis of Intentions, Strategies, and Challenges
Authors:
Muhammad Hamza,
Muhammad Azeem Akbar,
Kari Smolander
Abstract:
Serverless is an emerging cloud computing paradigm that facilitates developers to focus solely on the application logic rather than provisioning and managing the underlying infrastructure. The inherent characteristics such as scalability, flexibility, and cost efficiency of serverless computing, attracted many companies to migrate their legacy applications toward this paradigm. However, the statel…
▽ More
Serverless is an emerging cloud computing paradigm that facilitates developers to focus solely on the application logic rather than provisioning and managing the underlying infrastructure. The inherent characteristics such as scalability, flexibility, and cost efficiency of serverless computing, attracted many companies to migrate their legacy applications toward this paradigm. However, the stateless nature of serverless requires careful migration planning, consideration of its subsequent implications, and potential challenges. To this end, this study investigates the intentions, strategies, and technical and organizational challenges while migrating to a serverless architecture. We investigated the migration processes of 11 systems across diverse domains by conducting 15 in-depth interviews with professionals from 11 organizations. we also presented a detailed discussion of each migration case. Our findings reveal that large enterprises primarily migrate to enhance scalability and operational efficiency, while smaller organizations intend to reduce the cost. Furthermore, organizations use a domain-driven design approach to identify the use case and gradually migrate to serverless using a strangler pattern. However, migration encounters technical challenges i.e., testing event-driven architecture, integrating with the legacy system, lack of standardization, and organizational challenges i.e., mindset change and hiring skilled serverless developers as a prominent. The findings of this study provide a comprehensive understanding that can guide future implementations and advancements in the context of serverless migration.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
GDPR Compliant Blockchains-A Systematic Literature Review
Authors:
AKM Bahalul Haque,
AKM Najmul Islam,
Sami Hyrynsalmi,
Bilal Naqvi,
Kari Smolander
Abstract:
Although blockchain-based digital services promise trust, accountability, and transparency, multiple paradoxes between blockchains and GDPR have been highlighted in the recent literature. Some of the recent literature also proposed possible solutions to these paradoxes. This article aims to conduct a systematic literature review on GDPR compliant blockchains and synthesize the findings. In particu…
▽ More
Although blockchain-based digital services promise trust, accountability, and transparency, multiple paradoxes between blockchains and GDPR have been highlighted in the recent literature. Some of the recent literature also proposed possible solutions to these paradoxes. This article aims to conduct a systematic literature review on GDPR compliant blockchains and synthesize the findings. In particular, the goal was to identify 1) the GDPR articles that have been explored in prior literature; 2) the relevant research domains that have been explored, and 3) the research gaps. Our findings synthesized that the blockchains relevant GDPR articles can be categorized into six major groups, namely data deletion and modification (Article 16, 17, and 18), protection by design by default (Article 25), responsibilities of controllers and processors (Article 24, 26, and 28), consent management (Article 7), data processing principles and lawfulness (Article 5,6 and 12), and territorial scope (Article 3). We also found seven research domains where GDPR compliant blockchains have been discussed, which include IoT, financial data, healthcare, personal identity, online data, information governance, and smart city. From our analysis, we have identified a few key research gaps and present a future research direction.
△ Less
Submitted 1 April, 2021;
originally announced April 2021.
-
Twenty-one key factors to choose an IoT platform: Theoretical framework and its applications
Authors:
Mehar Ullah,
Pedro H. J. Nardelli,
Annika Wolff,
Kari Smolander
Abstract:
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing speci…
▽ More
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing specific services for such applications. Finding the best match between application and platform is, however, a hard task as it can difficult to understand the implications of small differences between platforms. This paper builds on previous work that has identified twenty-one important factors of an IoT platform, which were verified by Delphi method. We demonstrate here how these factors can be used to discriminate between five well known IoT platforms, which are arbitrarily chosen based on their market share. These results illustrate how the proposed approach provides an objective methodology that can be used to select the most suitable IoT platform for different business applications based on their particular requirements.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Observations of service identification from two enterprises
Authors:
Ville Alkkiomäki,
Kari Smolander
Abstract:
Service-oriented computing has created new requirements for information systems development processes and methods. The adoption of service-oriented development requires service identification methods matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been proposed, but less attention has been paid to the actual requirements of the methods. This paper…
▽ More
Service-oriented computing has created new requirements for information systems development processes and methods. The adoption of service-oriented development requires service identification methods matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been proposed, but less attention has been paid to the actual requirements of the methods. This paper provides an ethnographical look at challenges in service identification based on data from 14 service identification sessions, providing insight into the practice of service identification. The findings identified two types of service identification sessions and the results can be used for selecting the appropriate SIM based on the type of the session.
△ Less
Submitted 9 April, 2015;
originally announced April 2015.