Feeds

Akimbi automates application testing pools

Taking humans out

Beginner's guide to SSL certificates

A start-up is using virtualization technology to stake out a place in application testing with a product that streamlines development and helps cut costs.

Akimbi Systems has announced Slingshot, software capable of taking a snap shot of a server environment, storing hardware and software configurations, and automatically rolling back the configurations to a pool of machines for testing with specific new applications.

Akimbi says some customers have sliced up to 50 per cent from the costs associated with development by automating this stage in the application development cycle. Slingshot replaces the need for organizations to manually configure servers and runs on top of virtual machine (VM) software from Microsoft and VMsoftware.

"We are taking the human out of the loop completely," Akimbi chief executive and co-founder James Phillips told The Register.

Slingshot works with application lifecycle management (ALM) testing tools from Mercury Interactive, IBM/Rational, Microsoft, Borland Software and Segue Software, by tapping into the Slingshot APIs via a SOAP interface.

While Slingshot is using SOAP to talk to testing tools, Akimbi has worked at the VM level to ensure that multiple testing environments can run side by side in server pools. This work involves the ability to redirect packets, create a hidden VM and also update routing tables to avoid problems like IP conflicts. Slingshot is based on a VM architecture Akimbi bought from Ensism.

Akimbi is in talks with software tools companies as potential partners, according to Phillips. Its work at the architecture level means these companies will want to partner, rather than try to develop, rival offerings, he says:

"Some of the really hard operating system and virtual machine level technology is not something the other test tools vendors have as a core competency. We have gathered up a critical mass of folks who are pioneers in the virtual space on Intel hardware.." ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?