Salesforce.com connects Heroku and Force.com

One for workers and one for punters makes double the fun for devs

Beginner's guide to SSL certificates

Salesforce.com's decision to acquire Heroku has looked an oddity for a while: why does a SaaS juggernaut with its own perfectly good Force.com development platform need a PaaS play like Heroku?

The eternally-enthusiastic company has just spelled out why, and how, it thinks the two will work together. The scheme is simple: developers building apps for employees will do it on Force.com and developers building apps for punters to consume will do it on Heroku.

A new bit called Heroku Connect links the two. The idea seems to be that Heroku can take care of all the heavy lifting required to deliver a web app at scale. Force.com retains its role as the place to do custom app development for your team and the new connector pipes data between the two with sufficient speed that no-one gets grumpy.

In the background things aren't so simple. Salesforce lives on Oracle software. Heroku relies on its own version of Postgres. So they offer rather different environments for developers. Salesforce is also being a bit cagey on data centre arrangements: let's hope they've got Force.com and Heroku as physically close as possible – so latency doesn't rear its ugly head during data transfers.

Salesforce is talking up the formal release of Heroku Connector as enhancing its overall proposition by making it possible to feed customer-generated data into apps that run business processes. Pulling off that trick, it says, has not been easy unless you code your entire business by hand, either as a startup or a business colossus with more developers than sense.

There's some truth in that idea. It's probably also not far from the mark to suggest that what Salesforce has really done here is build middleware-as-a-service to link the two divergent parts of its platform. In a weird way that's a sign of maturity: most big IT rigs have middleware kludges in them somewhere.

Salesforce will, no doubt, prattle on about disruptive cloudiness, but under the skin it will be using some old-school methods to keep things going. ®

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story


Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.