Feeds

Novell to mashup management tools

No tea making facilities as yet, though

Boost IT visibility and business value

It seems that most of the IT industry is trying to figure out how to make money by vertically integrating some aspects of the data centre and selling a complete solution that addresses the whole stack. Novell - known predominantly for its NetWare and SUSE Linux operating systems - is no exception.

Having shelled out big bucks - well, at least compared to its size and cash pile - for a number of systems management tool makers, Novell is unveiling the product line and strategy it will bring to market in 2010 to deliver what it calls "intelligent workload management".

This will start with its SUSE Appliance online software packaging tool, which went beta in February and into production in July. Then it will stir in a whole bunch of code from its ZENworks system management tools, the PlateSpin virtual server management tools and the ManagedObjects business service management tools. Finally, add in Identity Manager for access control and security, before mashing the whole thing up in a pot and selling it as an integrated toolset for managing infrastructure and the applications that ride on top of it.

You've probably heard this many times before, most recently - as in last week - from an outfit called rPath and its Project Javelin. With that project, rPath, which was founded by some of the top ex-techies from Red Hat, is seeking to go beyond a repository-driven software appliance tool that rode atop a homegrown version of Linux.

It wants to be a kind of version control system for operating system, middleware and application software deployed in both development and production environments. In this case, Project Javelin is supporting Red Hat Enterprise Linux, Ubuntu, CentOS, and Novell's SLES and will from next year support Microsoft's Windows.

Like Novell's intelligent workload management effort - which does not have a code-name even though its components do - rPath's Project Javelin is a roadmap that will lead to a product set, rather than a single product that is currently ready for delivery.

According to Justin Steinman, vice president of solution and product marketing at Novell, one of the key differences between the two approaches is that Novell has the tools and the expertise in coping with security and access control at the operating system and application level. It has acquired and built the code that will allow it to do role-based access and control on software stacks that span physical servers, virtual machines, and cloud-style infrastructure.

"We think that CIOs are looking for tools to manage three pools of infrastructure - physical, virtual, and cloud," explains Steinman. "Decades ago, security meant locking a mainframe in the basement. But that is not going to work today. We've offered identity solutions, appliance tools, management solutions, but not in a tightly integrated fashion. Now we will." As for rPath, Steinman says that Novell is not all that worried. "The lack of security and identity management in rPath will really hamstring them," Steinman says.

Novell's intelligent workload management toolset - and man, does it ever need a better name - has eight core components. Some are kickers to currently shipping products, while others are based on code borrowed from different tools and mixed in new ways, and still others that have brand new code. The tools are grouped into four major functional groups, which are used to build, secure, manage, and measure the software stacks deployed internally on physical or virtual servers, or out on virtualized cloud infrastructure.

The workload build tools include the online SUSE Appliance Toolkit, which Steinman says will be ready for prime-time in the first quarter of 2010. The thing that needed to be added to the appliance service, which for now only builds appliances for Novell's SUSE Linux distro, is the ability to embed access and security settings, including per-user and role-based access, into the application stack. This way, as workloads move from physical to virtual to cloud infrastructure, the access and security settings can travel with the stacks.

Novell is being a bit cagey about exactly how it is going to make the security and access settings portable, but says that it is taking bits of its Sentinel log manager and event manager tools and embedding them in an agent that can travel with physical and virtual infrastructure. The creation and embedding of these security and access settings will not be done with the SUSE Appliance Toolkit, but rather with another tool code-named "Workshop," which is not expected to be delivered until the fourth quarter of 2010.

Application security programs and practises

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.