Feeds

IBM/Rational builds ALM

IBM Rational BuildForge

Beginner's guide to SSL certificates

Well, IBM/Rational has made its Application Lifecycle Management (ALM) story rather more complete by acquiring BuildForge (which plays in the ITIL Release Management space and wider) in May 2006. This is another example of a trend I identified earlier this year, I guess.

At a breakfast meeting a few days ago hosted by fmisolutions we got to see BuildForge working and IBM explained how it discovered that it loved the product so much it had to buy it. Basically, it lets you script the Build process, manage it as a process, run independent parts of it in parallel, and generally speed things up (by implication, Rational tools must be quite big pieces of software).

And, an efficient Build process is very useful if you're using Agile and need something like a continuous build process.

Of course, if a Build is taking all night, perhaps you shouldn't be building monolithic software. But if you've been left, or acquired, monolithic software which does the job, you may still have to maintain it and perhaps an efficient Build process is the lesser of several evils.

Anyway, IBM likes BuildForge, partly because it delivers rapid ROI and addresses real pain-points in an organisation - which then produces goodwill towards other Rational tools. Sensibly, IBM isn't making it too dependent on the rest of the Rational toolset, however (as far as I can see, integration so far is largely a friendly Rational badge on its screens, although doubtless this will increase), - no one likes to feel herded into a pen...

Derek Hutson (responsable for BuildForge Worldwide Sales in IBM) made some very interesting comments about integrating BuildForge with Rational-badged Service Management and ALM offerings next year, while maintaining its standalone capabilities and support for non-IBM tools. If you manage the Build process, you have a lot of information about precisely what code goes into your software; and Application Service Management ties the software into the business services it enables. The end result? Transparency right through from executable to business process.

But, it seems to me, ALM proper cuts across IBM's Tivoli and Rational brands - so I wonder how IBM will handle that? However, it does seem that Rational is still very much alive and well inside IBM, even if we haven't heard that much about it lately. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.