Feeds

Is SOA getting boring?

Politics takes over from technology

Secure remote control for conventional and virtual desktops

That hits on another point, which is IBM’s contention that it is best situated to glue everything together. Mills contended that SOA brings pressure on the SAPs and Oracles of the world to open their APIs using Service Component Architecture and Service Data Objects. Obliquely, it points to new competition for where new functionality gets situated: inside the application stack, or at the BPM or service composition layer in the middle. Mills denies that there’s a power struggle going on. In his words, the question of who wins or loses when you add SOA to the mix is “one of those silly debates… we’re not saying what we do is more important than what SAP does.”

Well, maybe it’s silly, but IBM has plenty of accounts where there’s a lot of SAP and Oracle, so there’s going to be competition for that middle tier.

But what about the other half of the enterprise market that uses homegrown rather than packaged apps? Later that day, we sat in on another session to explore how IBM is building a composite apps business for that segment (more specifically, for banking, insurance, telco, and healthcare sectors). This was a follow up to a session we caught a year ago, just as ink had dried on IBM’s Webify acquisition that brought the underlying technology for building vertical industry SOA frameworks.

Balance of power questions abounded there as well, although IBM is taking pains not to call these composite applications, but composite solutions. The inference is that solutions are supersets of applications, and thanks to SOA, far more dynamic.

With that assumption, IBM is still playing linchpin - they own the underlying framework, and reprising the role performed by its global business services groups, IBM also plays arbiter in recommending solutions. This year, it introduced tooling that allows customers to add their own framework extensions, or get IBM to integrate third parties currently not on their preferred partner list. Three partners - Kana for contact management, Seec for insurance business components, and Chordiant for “customer experience solutions" - testified that of course it’s a two-way partnership (they’re also veteran IBM business partners).

But IBM is clearly first among equals, as the framework is its own, is responsible for level one support, and therefore, is positioned to assert account control. But realizing that the technology has surged ahead of the business model, IBM and partners are still shaping the rules of engagement for composites as they go along.

From a technology standpoint, SOA might be getting a lot more boring. However, impacts to vendor business relationships are for now anything but.

This article originally appeared in onStrategies.

Copyright © 2008, onStrategies.com

Tony Baer is the principal with analyst onStrategies. With 15 years in enterprise systems and manufacturing, Tony specialises in application development, data warehousing and business applications, and is the author of several books on Java and .NET.

Beginner's guide to SSL certificates

More from The Register

next story
Nexus 7 fandroids tell of salty taste after sucking on Google's Lollipop
Web giant looking into why version 5.0 of Android is crippling older slabs
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
SLURP! Flick your TONGUE around our LOLLIPOP – Google
Android 5 is coming – IF you're lucky enough to have the right gadget
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.