Feeds

HP and SAP go industrial

Have screwdriver - will develop

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Hewlett Packard has put its formidable weight behind SAP's version of Service Oriented Architecture (SOA) with the announcement this week of a bagful of new services under the banner of SAP's Enterprise SOA. The new services will extend HP's existing Adaptive Infrastructure to work alongside SAP's NetWeaver Portal and aim to make it easier for HP's SAP customers build service-based applications.

HP is the fifth largest SAP site in the world and claims it has installed 55,000 customer implementations of SAP - a combination which puts it in a unique position as an SAP supporter and implementer. It says the new initiative will enable its SAP customers to ride the new wave of service-based computing.

HP sees future applications increasingly created from predefined services rather than built from scratch. Last year it introduced its own implementation of a Composite Application Factory to provide customers with a method of building custom applications from services components.

"We see this as a way to move away from monolithic development to a more flexible approach based on a catalogue of component services from which you can compose an application," explains Harald Binder, marketing manager for application services at HP Services Europe. "The Composite Application Factory is a way to industrialise this approach and, to a degree, we see development being replaced by composition."

Binder says that the approach is an evolutionary step forward from object-oriented, component-based development. While he accepts that such software re-use strategies have not always delivered on their promise in the past, increased standardisation and better packaging means there is much better chance it will be successful this time round.

"The difference is that these are self-defining objects which can, for example, work across HTTP without proprietary links,” he said. “Yes there is still a lot of work to do but we see this as quite a step forward."

If you want to learn more, try here. ®

Security for virtualized datacentres

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.