Feeds

The real reason why Dell wants to go private: To fondle big Boomis

Cloud integrator waggles its new API tool

Application security programs and practises

Dell has added an API management tool to its Boomi platform, which connects up clouds and in-house applications.

The new component - which monitors and controls software interfaces used to hook together various services within an enterprise - is included in an upgrade that also adds new integration and process management features to Boomi's AtomSphere service, the PC slinger announced today.

"Cloud integration allows our customers to connect and integrate any two endpoints that they want to have communicating with each other," Boomi product manager Chris McNabb told The Register.

A classic Boomi use case would be merging the HR data from one recently acquired company into that of the main organisation, McNabb said.

With the upgrades, Dell has broadened the remit of Boomi so that along with migrating and integrating app data, the cloud can also be used by organizations to manage the various APIs consumed by their software.

This feature follows a tumultuous few months in the typically quiet API management sector, in which Intel grabbed API manager Mashery, CA acquired Layer 7, and Mulesoft raised $37m in funding to broaden the remit of its own API business.

"The reason why all these companies are getting snapped up is because of the proliferation of endpoints in an enterprise - it's scaling faster than people can manage them," McNabb said. "You need to provide CIOs and directors of IT the ability to secure and throttle and scale and measure and monitor all these endpoints that are popping up all over the place."

Boomi API Management lets administrators filter access by IP address, apply rate limiting to protect against DDoS attacks, and has an option for super-charging web-based app performance by booting the app in-memory, though this also disables logging.

Besides API management, the release also sees Dell expand the capabilities of Boomi integration packs, which are pre-built scripts to help migrate data from one app to another: such as from fringe finance apps into Salesforce and vice versa. Along with this, the company added "process libraries", which are recipes for app integration and migration that frequent Boomi users can brew up and store. These make it easy to manage the same app when deployed across disparate hardware stacks.

Dell acquired Boomi in November 2010 as the company sought to create a cloud-based software business almost from scratch. Michael Dell has put such importance on software that one of the reasons he wants to take Dell private is to give him the privacy needed to perform strategic-reassignment surgery on the company, to swing it around from being a box-slinger to software-server.

The Boomi updates show that for all the confusion at the top of the company, there's still incremental software work being done at the bottom. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.