Feeds

Swiss SOA firm puts modelling over programming

Enterprise integration tool is run-time UML interpreter

Internet Security Threat Report 2014

Swiss company E2E has set up a UK office to sell its enterprise application integration software. It's taking an unorthodox approach to EAI - instead of selling tools to help programmers build interfaces that translate between applications, it has designed a interpreter, called E2E Bridge, that takes business models written in UML (unified modelling language) and uses those to generate the necessary data movements.

The usual way to fill the gap between existing apps and process-oriented business services (or SOA) is traditional programming work, the company says. Business analysts prepare a model, showing which apps need to exchange which data, and then programmers implement it.

E2E claims that its "model-driven integration" approach is quite different, as its software works directly with the UML model to expose the underlying apps as services.

"We have a C++ engine that uses a UML file as parameters. It's certainly not the standard way of cutting code. It doesn't generate code or require you to learn a toolkit," said its UK technical director Shaun Conn.

"We would expect a customer to have the back-end in place and know how they want to expose the services. We can use whatever technology they have - for example, we could do model-driven conversion between SAP and a database."

Of course, the E2E Bridge still needs to understand the APIs available to it within the various applications. But Conn claimed that it's a matter of putting the complexity where it belongs - in software, not programming teams.

"EAI tools can cost five to ten times the software cost in implementation fees," he said. "Most companies already have the modelling skills, but not the software development skills - we just execute their designs. When we tell them that, people think there's something missing, but there isn't.

"It moves the workload back to the business analysts, not the database analysts and Java programmers, which to be honest is the way a CIO should want it to go. It's a matter of how data is seen and accessed, not what software is used underneath.

"Ultimately, only the model will be important. All software vendors will expose their services in the same way, and UML will make it possible for CIOs to design services." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.