Feeds

Data appliances smarten up their act

Reliability, functionality, speed

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The phrase "the network is the computer" was originally coined to suggest that computers connected by a network make a much more powerful solution. But, nowadays it has another connotation as more and more intelligence is being put into network appliances.

An appliance is a device that provides a limited, well-defined function as compared to a general-purpose computer that can provide any function. The advantage of appliances is that they remove a lot of the complexity of a general-purpose machine and this means that they are more reliable and faster. They sit on the network in a similar way to hardware routers and firewalls, hence the view that network is becoming the computer. They in fact tend to be built using standard hardware and run a cut down version of UNIX that provides just sufficient function for their needs. Their potential down side is that they have to be connected together in complex configurations to provide a total solution, the complexity adds to the total cost of ownership (TCO).

The solution is to put more functionality into one appliance, but still retain the reliability and speed of an appliance. One company that has been following this path for the last five years in the XML space is DataPower. They started with an XML accelerator appliance (XA35), which allows the processing of XML, XSD, XPath and XSLT at wire-speed. This is based on a patent that was granted early in August 2004, the patent describes a formal language for describing the transformation (this can be used for supporting XML and non-XML formats) and the on the fly compilation technology required to turn the language into executable code on the appliance.

Once an accelerator had been developed there was a need to provide adequate security. All XML Web services security functions, such as XML schema validation, XML Encryption, XML Signature, WS-Security and others, require extensive XML processing, so it makes perfect sense to build the security using the same technology. Hence, DataPower created the XS40 XML Security Gateway.

In mid-August DataPower announced the next step in this journey with the XI50 XML Integration Appliance. XI50 Integration Appliance supports a range of popular transport protocols, including IBM MQ Series. XI50 can parse and transform arbitrary binary, flat text and XML messages, including COBOL Copybook, CORBA, CICS, ISO 8583, ASN.1 and EDI. The XI50 includes the functions of the XS40 and XA35.

The benefit of this approach is that all the translation from non-XML functions and protocols to a standard XML format can be off-loaded into the appliance. This should reduce the operational cost and also reduce the complexity of supporting changes in the connected systems. This means that the Business Process Management servers, and the application servers, can concentrate on creating new business solutions as they will be send and receive everything in a standard XML format.

We would expect to see further use of the appliance concept both to provide a wider range of function but also to provide more sophisticated functions, for example it could be possible to implements business rules in an appliance. Expect further cost improvements, new functionality and better integration of appliances and other servers as DataPower and others extend the scope and power of appliances.

Copyright © 2004, IT-Analysis.com

Related stories

CA shakes up web services management market
XML shows promise, but
Forum Systems aims At XML security space

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.