Feeds

IBM's Transitive buy presents interesting server options

Emulation is the sincerest form of fattening

3 Big data security analytics techniques

Here's a story you've heard a bunch of times: IBM liked the software so much, it bought the company. And so the story ran again last week, when Big Blue bought software emulation specialist Transitive for an undisclosed sum. Transitive makes a bit of software called QuickTransit, which allows applications created for one chip to be encapsulated and run on completely different architectures.

Like so many of IBM's moves, the acquisition of Transitive appears to be both an offensive and defensive move at the same time. More on that in a bit. But first, let's review what QuickTransit was when it was launched in September 2004 and how it has been used since then.

The technology underlying QuickTransit is the result of work that Alasdair Rawsthorne, a computer science professor at Manchester University who is also a processor designer well acquainted with deconstructing programs at runtime and optimizing them, started in 1995 with a bunch of students. They wanted to take a stab at the software emulation problem - running code for one system on another one with a completely different architecture - and figured out a way to modularize the emulation problem to improve performance as well as allowing support for multiple platforms.

Transitive was formed in October 2000, and after three rounds of venture capital financing (bringing in $24m), the company delivered QuickTransit in late 2004. At the time, Transitive was headquartered in Los Gatos, California, where it had seven employees, with a research and development center back in Manchester with 60 engineers. Pond Venture Partners, Manchester Technology Fund, Crescendo Ventures, Accel Partners, and Meritech Capital Partners all kicked in the dough.

At launch time back in 2004, Transitive had these four different products available, and this original list is important, since a lot of people forgot that mainframe apps were part of the plan for porting apps, and by extension, so could AS/400 midrange applications be done:

  • QuickTransit for Itanium: supported MIPS, Power/PowerPC, X86, and mainframe binaries
  • QuickTransit for Opteron: supported MIPS, Power/PowerPC, and mainframe binaries
  • QuickTransit for X86: supported MIPS, Power/PowerPC, and mainframe binaries
  • QuickTransit for Power/PowerPC: supported MIPS, X86, and mainframe binaries

The QuickTransit tool has three parts. One bit runs on the source platform where the operating system and binary applications were originally created. There is also a back-end part of QuickTransit that sits on the target platform, with its processors and operating systems. Sitting between the QuickTransit front-end and back-end is the secret sauce, an optimizer layer that translates blocks of instructions in the source platform into an intermediate form, which Transitive calls intermediate representation, or IR. The optimizer, as the name suggests, performs optimizations on these blocks of instructions and stores these routines in the cache of the target server platform. The optimizer then encodes the binaries for the new target environment and handles all of the operating system and graphics mapping calls, which allows the application to run.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.