Feeds

Fujitsu stacks up SOA

Could Japan congeal SOA hot air?

Securing Web Applications Made Simple and Scalable

In as much as Service Oriented Architectures (SOA) are predominantly hot air rather than current implementation strategy for most of both the user and vendor community, it is quite difficult to point to any from either camp that can be readily identified as an obvious leader. With the launch of SystemWalker, however, Fujitsu Software highlights the possibility that, if a leader is to emerge, it might just come from Japan rather than the USA or Europe.

SystemWalker is a systems management suite of tools that makes up the third part of a three part service-provision-based stack that has just been launched onto a rest-of-the-world marketplace. According to Raymond Buchan, director of marketing and business development in Europe, reckons the combination makes Fujitsu the first vendor to build a complete Service Management suite.

But it has been available for some time in Japan, together with the other two elements of the stack, the Interstage integration suite and Fujitsu’s own service division. The company has some 26,000 users of the suites ‘worldwide’ – and while the company is keen to stress the worldwide credentials, the vast majority of these are in Japan and include some of the big names of manufacturing and service provision, such as the Toyota and Nissan car companies, Japan Airlines and NTT Docomo.

That means Japanese users are likely to be building a track record of implementations and understanding of SOA in real life that western users have not got near as yet. And as Japanese companies showed with manufacturing many years ago, having ‘technology’ is secondary to what you do with it, and around it.

For example, most SOA contenders still drift towards ‘their’ technologies as their primary differentiators, which spawned the now derided ‘Highlander Principle’ – there can only be one (so long as it’s theirs). Fujitsu is, in fact, one of the few vendors that could lay a reasonable claim to being able to offer the whole SOA stack, from individual system management through integration and onto complete managed services, it is also one of the few to stress, as Declan Jones, Director of Fujitsu Europe said, that “our advantage is that we own the whole stack, but the stack is loosely coupled and one part is not dependent on another being present.”

SystemWalker is now being made available worldwide, though the company has been building up its support network in Europe for some time. Together with the Interstage integration suite and the Fujitsu Services component, it forms what the company is calling Triole (actually a German musical term for ‘combining three’) – a move towards what it terms the industrialisation of software.

This is based on the development of templates for the management of specific Line of Business applications such as SAP and Oracle – a move also being adopted by HP in its latest announcements – as well as templates for developing applications using J2EE or .NET. Other templates will be added to meet customer demand. The company pre-tests and qualifies the component parts of the templates, which means that developers move towards a world based on building processes from tested code sub-assemblies rather than direct code-cutting. It also provides a good basis for continual process improvement within the business, such as demanded with Capability Maturity Model Integration (CMMI) accreditation.

The components making up SystemWalker include a Centric Manager, which is the hardware and software infrastructure management component, which can manage the simultaneous use of multiple versions of multiple applications, thus covering compliance management issues. The applications specific templates work through this component.

A Resource Co-ordinator covers the management of system virtualisation, while an Operations Manager acts as the overall job scheduler and a Service Quality Co-ordinator manages the service levels being provided to users. This incorporates a ‘dummy customer’ model which uses a client browser to measure service and performance, back into the system, from the client’s perspective. There are also some desktop components in the suite, including Desktop Patrol for compliance management tasks such as licence and version management, and Desktop Keeper which, together with an associated encryption management tool, manages as secures what individual users download to remote working devices such as Flash memory cards. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.