Feeds

Old lamps for new

Old technologies need re-inventing

  • alert
  • submit to reddit

SANS - Survey on application security programs

Letters A couple of items in Reg Developer have prompted responses that continue a theme raised here before – that old software technologies that were developed years ago to solve perennial business management problems are still probably the best solution and should therefore be resuscitated - or perhaps unknowlingly re-invented.

For example, a welcome email arrived the other day from IBM distinguished engineer, Mark Cathcart (one of that company’s rocket scientists on virtualisation, architectures and design) in response to my piece on the possibilities of re-inventing batch processing.

He kindly pointed me at a press release that, I blush to admit, had escaped my notice. This revealed that, back in May this year, IBM had announced Batch-on-Grid – yes, good old batch processing technology adapted to run on Grid architectures, mixing old-style batch job queues with autonomic management systems to control and allocate the workloads.

In a comment to that piece, Del Merritt bemoaned the fact that most modern servers are only about as good as an old DEC VAX ever was. Given that HP can now run the VAX’s native O/S’s on the Itanium platform, perhaps it will re-invent that box, and give Itanium a new market as a helpful by-product.

In a similar vein, Deepak Vohra’s tutorial on Ruby on Rails has been generating plenty of positive interest, but it has also rattled the cages of one or two among our - how shall we say - more mature readers. And it is fair to say that the rattling has been caused by an arguably valid point.

As one correspondent put it:

'C' , C++, perl, Python, Java, Eifel, Ruby and Rails - those poor Unix-babies; they still don't get it?

The basic structures of 'C' and Unix are poorly suited to both business application development and device control.

Webservers are document presentation tools, not transaction processors.

Oracle is for data mining static tables, not real time posting.

One size does not fit all.

Quit trying to re-invent the wheel. Learn NS Guardian, System 360 (or whatever IBM calls it these days) Pathway CICS, DB2, NS SQL and COBOL.

It seems a fair point. There are technologies that are suitable for the glitz and gloss of presentation and the tricks unique to the web, but when it comes to what often lies behind that stuff – the need to run a business and not have it go belly up – most of the needed technology is there already, and has been for years.

Tell me I’m wrong, but it does seem like the software industry wants to invent new technology versions of "old lamps", when the old lamps are still better suited to the job. ®

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.