Feeds

Novell to mashup management tools

No tea making facilities as yet, though

The smart choice: opportunity from uncertainty

It seems that most of the IT industry is trying to figure out how to make money by vertically integrating some aspects of the data centre and selling a complete solution that addresses the whole stack. Novell - known predominantly for its NetWare and SUSE Linux operating systems - is no exception.

Having shelled out big bucks - well, at least compared to its size and cash pile - for a number of systems management tool makers, Novell is unveiling the product line and strategy it will bring to market in 2010 to deliver what it calls "intelligent workload management".

This will start with its SUSE Appliance online software packaging tool, which went beta in February and into production in July. Then it will stir in a whole bunch of code from its ZENworks system management tools, the PlateSpin virtual server management tools and the ManagedObjects business service management tools. Finally, add in Identity Manager for access control and security, before mashing the whole thing up in a pot and selling it as an integrated toolset for managing infrastructure and the applications that ride on top of it.

You've probably heard this many times before, most recently - as in last week - from an outfit called rPath and its Project Javelin. With that project, rPath, which was founded by some of the top ex-techies from Red Hat, is seeking to go beyond a repository-driven software appliance tool that rode atop a homegrown version of Linux.

It wants to be a kind of version control system for operating system, middleware and application software deployed in both development and production environments. In this case, Project Javelin is supporting Red Hat Enterprise Linux, Ubuntu, CentOS, and Novell's SLES and will from next year support Microsoft's Windows.

Like Novell's intelligent workload management effort - which does not have a code-name even though its components do - rPath's Project Javelin is a roadmap that will lead to a product set, rather than a single product that is currently ready for delivery.

According to Justin Steinman, vice president of solution and product marketing at Novell, one of the key differences between the two approaches is that Novell has the tools and the expertise in coping with security and access control at the operating system and application level. It has acquired and built the code that will allow it to do role-based access and control on software stacks that span physical servers, virtual machines, and cloud-style infrastructure.

"We think that CIOs are looking for tools to manage three pools of infrastructure - physical, virtual, and cloud," explains Steinman. "Decades ago, security meant locking a mainframe in the basement. But that is not going to work today. We've offered identity solutions, appliance tools, management solutions, but not in a tightly integrated fashion. Now we will." As for rPath, Steinman says that Novell is not all that worried. "The lack of security and identity management in rPath will really hamstring them," Steinman says.

Novell's intelligent workload management toolset - and man, does it ever need a better name - has eight core components. Some are kickers to currently shipping products, while others are based on code borrowed from different tools and mixed in new ways, and still others that have brand new code. The tools are grouped into four major functional groups, which are used to build, secure, manage, and measure the software stacks deployed internally on physical or virtual servers, or out on virtualized cloud infrastructure.

The workload build tools include the online SUSE Appliance Toolkit, which Steinman says will be ready for prime-time in the first quarter of 2010. The thing that needed to be added to the appliance service, which for now only builds appliances for Novell's SUSE Linux distro, is the ability to embed access and security settings, including per-user and role-based access, into the application stack. This way, as workloads move from physical to virtual to cloud infrastructure, the access and security settings can travel with the stacks.

Novell is being a bit cagey about exactly how it is going to make the security and access settings portable, but says that it is taking bits of its Sentinel log manager and event manager tools and embedding them in an agent that can travel with physical and virtual infrastructure. The creation and embedding of these security and access settings will not be done with the SUSE Appliance Toolkit, but rather with another tool code-named "Workshop," which is not expected to be delivered until the fourth quarter of 2010.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.