Feeds

Novell to mashup management tools

No tea making facilities as yet, though

5 things you didn’t know about cloud backup

It seems that most of the IT industry is trying to figure out how to make money by vertically integrating some aspects of the data centre and selling a complete solution that addresses the whole stack. Novell - known predominantly for its NetWare and SUSE Linux operating systems - is no exception.

Having shelled out big bucks - well, at least compared to its size and cash pile - for a number of systems management tool makers, Novell is unveiling the product line and strategy it will bring to market in 2010 to deliver what it calls "intelligent workload management".

This will start with its SUSE Appliance online software packaging tool, which went beta in February and into production in July. Then it will stir in a whole bunch of code from its ZENworks system management tools, the PlateSpin virtual server management tools and the ManagedObjects business service management tools. Finally, add in Identity Manager for access control and security, before mashing the whole thing up in a pot and selling it as an integrated toolset for managing infrastructure and the applications that ride on top of it.

You've probably heard this many times before, most recently - as in last week - from an outfit called rPath and its Project Javelin. With that project, rPath, which was founded by some of the top ex-techies from Red Hat, is seeking to go beyond a repository-driven software appliance tool that rode atop a homegrown version of Linux.

It wants to be a kind of version control system for operating system, middleware and application software deployed in both development and production environments. In this case, Project Javelin is supporting Red Hat Enterprise Linux, Ubuntu, CentOS, and Novell's SLES and will from next year support Microsoft's Windows.

Like Novell's intelligent workload management effort - which does not have a code-name even though its components do - rPath's Project Javelin is a roadmap that will lead to a product set, rather than a single product that is currently ready for delivery.

According to Justin Steinman, vice president of solution and product marketing at Novell, one of the key differences between the two approaches is that Novell has the tools and the expertise in coping with security and access control at the operating system and application level. It has acquired and built the code that will allow it to do role-based access and control on software stacks that span physical servers, virtual machines, and cloud-style infrastructure.

"We think that CIOs are looking for tools to manage three pools of infrastructure - physical, virtual, and cloud," explains Steinman. "Decades ago, security meant locking a mainframe in the basement. But that is not going to work today. We've offered identity solutions, appliance tools, management solutions, but not in a tightly integrated fashion. Now we will." As for rPath, Steinman says that Novell is not all that worried. "The lack of security and identity management in rPath will really hamstring them," Steinman says.

Novell's intelligent workload management toolset - and man, does it ever need a better name - has eight core components. Some are kickers to currently shipping products, while others are based on code borrowed from different tools and mixed in new ways, and still others that have brand new code. The tools are grouped into four major functional groups, which are used to build, secure, manage, and measure the software stacks deployed internally on physical or virtual servers, or out on virtualized cloud infrastructure.

The workload build tools include the online SUSE Appliance Toolkit, which Steinman says will be ready for prime-time in the first quarter of 2010. The thing that needed to be added to the appliance service, which for now only builds appliances for Novell's SUSE Linux distro, is the ability to embed access and security settings, including per-user and role-based access, into the application stack. This way, as workloads move from physical to virtual to cloud infrastructure, the access and security settings can travel with the stacks.

Novell is being a bit cagey about exactly how it is going to make the security and access settings portable, but says that it is taking bits of its Sentinel log manager and event manager tools and embedding them in an agent that can travel with physical and virtual infrastructure. The creation and embedding of these security and access settings will not be done with the SUSE Appliance Toolkit, but rather with another tool code-named "Workshop," which is not expected to be delivered until the fourth quarter of 2010.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?