Feeds

Zend plugs PHP into Amazon cloud

What devs want

High performance access to file storage

Zend Technologies has plugged its PHP web development framework into Amazon's cloud.

On Friday, the company unveiled version 1.8 of its Zend Framework, and for the first time, users can tap directly into the processing and storage resources offered by Amazon Web Services (AWS).

"We're allowing PHP developers to utilize Zend Framework components in order to interact with Amazon's services," Zend Framework project leader and architect Matthew Weier O’Phinney told The Reg. Developers can access Amazon's Simple Storage Service (S3) directly from PHP, as if it were a remote file system, adding and removing files via scripts. Plus, they can seamlessly upload, start, and stop server instances on Amazon's Elastic Compute Cloud (EC2).

"So, you can scale your web application when you need to. If you have a traffic spike, you get a couple more instances running on EC2."

Zend's new EC2 service was driven by a project contributor working for a business already using the framework in tandem with AWS. And O’Phinney said that countless other developers have requested such tight integration with Amazon's fluffy web-based infrastructure.

"We all want to write and deploy the next Twitter or the next Facebook, and the only way you're going to be able to do that is if you're able to off-load some of your computing power from your own servers," O’Phinney said. "Amazon is a great way to get started with that, right off the bat."

Could Amazon handle the next Twitter? You have to wonder.

Zend 1.8 also offers rapid application development (RAD), a means of quickly prototyping web apps. With the framework's RAD-happy Zend_Tool component, developers can build data and process models on the fly, mapping out a web app to suit their particular needs.

The Zend Framework - free and open-source - is available by-itself or as part of the Zend Server, the company's web application server. Zend Server offers a kind of data caching back-end, for off-loading processing duties from the app itself, and as O’Phinney pointed out, this could potentially be used in tandem with Amazon EC2 as well. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.