Feeds

Fujitsu and Software AG set sail to chart services

Be there Dragons out there?

Choosing a cloud hosting partner with confidence

Fujitsu Software and Software AG are collaborating to make it at least a little bit easier to map the software services floating free around the typical organizaton.

One of the troubles with Service-Oriented Architectures is the very obvious fact that just about every software vendor in the world has a story to tell users, and most of the stories are subtlely – and sometimes significantly – different. If the vendors were ancient mariners, they would be spinning yarns of adventures in uncharted waters, and if they had any charts at all they would be littered with the legend: `Here Be Dragons’.

So, if users looking towards the notion of exploiting SOA can get their hands on some technology that provides a map of some sort it could be an advantage, especially if it also helps them turn some of the dragons into pussy cats.

That is, at least in part, the objective of CentraSite, a joint development between Fujitsu Software and Software AG. This is a repository of applications metadata that aims to provide a topology of available services within an enterprise, covering the relationship between the functions being employed to create them.

The idea is that it should become the map of what makes up a service, be it new applications code, existing legacy applications, or component functions effectively `extracted’ from those legacy apps. This latter capability should mean that users can get a better level of re-use of existing applications investments.

The idea of a repository or map of a service is not new. Companies such as Systinet have already launched products in this area. But Fujitsu and Software AG claim that CentraSite adds new capabilities, such as the management of metadata concerning the initiation of services, plus providing dependency information and impact analysis reports.

To begin with, Fujitsu and Software AG are aiming to exploit the development themselves. Fujitsu will be incorporating the technology into its Interstage Business Process Manager, while Software AG will be adding it into its Enterprise Information Integrator and Enterprise Service Integrator.

The pair does, however, plan to start a community program aimed at getting both external business partners and other software vendors to start using CentraSite.®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.