Feeds

Zend plugs PHP into Amazon cloud

What devs want

Combat fraud and increase customer satisfaction

Zend Technologies has plugged its PHP web development framework into Amazon's cloud.

On Friday, the company unveiled version 1.8 of its Zend Framework, and for the first time, users can tap directly into the processing and storage resources offered by Amazon Web Services (AWS).

"We're allowing PHP developers to utilize Zend Framework components in order to interact with Amazon's services," Zend Framework project leader and architect Matthew Weier O’Phinney told The Reg. Developers can access Amazon's Simple Storage Service (S3) directly from PHP, as if it were a remote file system, adding and removing files via scripts. Plus, they can seamlessly upload, start, and stop server instances on Amazon's Elastic Compute Cloud (EC2).

"So, you can scale your web application when you need to. If you have a traffic spike, you get a couple more instances running on EC2."

Zend's new EC2 service was driven by a project contributor working for a business already using the framework in tandem with AWS. And O’Phinney said that countless other developers have requested such tight integration with Amazon's fluffy web-based infrastructure.

"We all want to write and deploy the next Twitter or the next Facebook, and the only way you're going to be able to do that is if you're able to off-load some of your computing power from your own servers," O’Phinney said. "Amazon is a great way to get started with that, right off the bat."

Could Amazon handle the next Twitter? You have to wonder.

Zend 1.8 also offers rapid application development (RAD), a means of quickly prototyping web apps. With the framework's RAD-happy Zend_Tool component, developers can build data and process models on the fly, mapping out a web app to suit their particular needs.

The Zend Framework - free and open-source - is available by-itself or as part of the Zend Server, the company's web application server. Zend Server offers a kind of data caching back-end, for off-loading processing duties from the app itself, and as O’Phinney pointed out, this could potentially be used in tandem with Amazon EC2 as well. ®

SANS - Survey on application security programs

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.