Resiliency patterns are good to a certain extent in providing the required resiliency. In this section, we will be focusing on the various aspects of establishing and enforcing the mandated resiliency.
With the faster proliferation of mobile, wearable, portable, nomadic, wireless, and various other I/O devices, the users are demanding ubiquitous access to various applications, services, data sources, and content. For realizing sophisticated applications, not only the pervasive access but also the easy and quick leverage of data and services is essential. That means software applications and services ought to be made available all the time. Even if there is an attack on one or more services, the system has to continuously function by tolerating all kinds of faults, failures, and mishaps. If the application is under a heavy load, then the system has to scale up or out accordingly to respond...