16
Tue, Apr
5 New Articles

IBM Purchases DataPower Technology

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

On October 18, IBM announced that it had purchased Cambridge, Massachusetts-based DataPower Technology Inc. for an undisclosed amount of money. DataPower Technology markets hardware appliances that speed and secure message traffic that flows through service-oriented architectures (SOAs). These appliances are black boxes that sit between servers and offload some of the XML processing loads so that software like WebSphere can run faster without needing to chew up cycles for XML security.

Working with Tivoli and WebSphere

DataPower currently markets three such appliances: one for boosting the performance of XML processing, one to add security to high-speed messaging processing, and one for message transformation and integration. These appliances integrate with IBM's Tivoli brand operations products, purportedly simplifying some of the management concerns that such devices might create. At the same time, they're designed to work with WebSphere, making it a natural add-on to organizations that are really focusing on WebSphere SOA solutions.

SOAs have been lauded as an important element in the future development of software, and many analysts believe SOAs will revolutionize how applications are built. However, the standards for Web Services and XML are still evolving, and as a result, security within an SOA has taken on increasing complexity and importance.

Promising SOA for On Demand Applications

The promise of SOAs lies in the potential to build applications on demand from disparate chunks of code and data that are distributed across the network. However, such a distributed assemblage of code and data also lends itself to security breaches unless there is a substantially robust security mechanism.

Unfortunately, the standard mechanisms for defining this kind of security--especially in the implementation of XML--are still being evolved, and there are ongoing and heated debates within the developer community about how these security mechanisms can be integrated best.

Complexity and Performance Considerations

Consider, for example, that a SOA defines how an application can be assembled as a Web service from potentially thousands of different, interchangeable parts located on a potentially limitless network of machines running different application servers on top of different operating systems--each with potentially diverse security mechanisms. If the goal is to bring these pieces together to create an on demand application like a Web service, there has to be both transparency of standards and innate and verifiable security. This is just one of the challenges facing organizations implementing SOA.

Moreover, one byproduct of this evolution of standards is that performance suffers because so much processing power is consumed in parsing security. Indeed, XML security processing is largely an XML processing nightmare. Complex cryptographic processing and the associated XML parsing, filtering, validation, and XPath/XSLT processing are extremely resource-intensive. Unfortunately, as a result, this security processing is sometimes simply turned off in production systems because it slows down the very transactions it's supposed to protect.

How XML Appliances Reduce Bottlenecks

Of course, analysts believe that evolving XML security engines--when they are finally mature--will provide robust XML security without creating performance bottlenecks. In the meantime, however, organizations that are developing their applications using SOA have to deal with the real world of performance degradation, and that's where DataPower Technology's XML appliances have found a market.

These appliances are highly sophisticated, dedicated micro-processors specifically designed to streamline cryptographic processing, XML parsing, filtering, validation, and XPath/XSLT processing. In other words, instead of chewing up CPU resources of the main server that is assembling the application, these appliances increase performance through dedicated hardware.

Why IBM's Purchase Is Significant

IBM's decision to purchase DataPower Technology is a powerful message that SOAs and Web services are approaching a new threshold of maturity and viability, especially for larger organizations. Why? Because in technology, as one moves programmable functions into hardware, one is acknowledging that the technology is starting to gel and become an accepted standard.

This is, of course, how telecommunication protocols led to the initial modem circuitry. It's also how the routing requirements of TCP/IP evolved into such products as Cisco Systems routers: Devices are first emulated as code using general-purpose micro-processors and later burned into firmware for greater efficiency. Finally, they are integrated into arrays of silicon circuitry, achieving maximum miniaturization and performance.

IBM is the first major player in the SOA environment to bridge this gap between SOA's evolving software standards and the implementation of those standards in a hardware appliance. IBM says it plans to use DataPower's XML appliance technology to further its support of WebSphere customers and to develop new products in the future, with announcements coming later in the year.

What could such a product line look like? How far could IBM take the concept of the XML appliance? Some analysts believe that while the initial products will be adaptations of DataPower Technology appliances, the sky is the limit as to how deeply IBM might delve into the miniaturization of XML processing.

A Hardware-Based SOA?

Just a few short years ago, applications were built specifically for individual hardware platforms. Consider, for instance, the evolution of the AS/400. On the AS/400, software consisted of the operating system and RPG. Neither could run on non-IBM boxes. The RPG compiled code communicated to hardwired terminals connected to the CPU using a proprietary twinaxial controller. This controller communicated through the twinax cable, sending a specific stream of bits that were uniquely designed to drive the IBM 5250 terminal devices. All of this composed something that IBM called the System Network Architecture (SNA). It was supplemented with a variety of communications protocols that were specific to the IBM hardware, such as Synchronous Data Link Control (SDLC).

When one stops to think about the complexity of the SNA, one begins to realize that the majority of the working intelligence of that architecture was almost entirely implemented in hardware. And it was implemented in hardware for purposes of performance. Within SNA, the software was by far the smallest proportion of the network's intelligence.

Role Reversals

Today, in SOAs, the significance of the roles of software and hardware are reversed. But do these roles have to remain separate?

The open standards process is allowing the evolution of Web services to progress swiftly, but it's also creating complexities that become performance hurdles. As these complexities are identified and as solutions are engineered, the code itself will begin an engineering journey from software to firmware to silicon circuitry.

Who knows? In the end, there is no reason why SOAs couldn't actually be composed of dedicated microprocessors and integrated circuits specifically designed to deliver and construct on demand applications across the network.

The Past as Prologue

When and if that kind of evolution occurs, we'll have moved substantially beyond the constructs of computing architectures that we are using today. Neither the operating system nor the CPUs running the code will be as significant. The network will be the computer.

But will we be looking at the future, or will we be looking backward through a mirror at the SNA of wire and steel that once ran our applications in days gone by?

That's the kind of question that XML appliances are fostering in the minds of industry analysts, and IBM's purchase of DataPower Technology is just a hint of the potential.

Thomas M. Stockwell is Editor in Chief of MC Press Online.

Thomas Stockwell

Thomas M. Stockwell is an independent IT analyst and writer. He is the former Editor in Chief of MC Press Online and Midrange Computing magazine and has over 20 years of experience as a programmer, systems engineer, IT director, industry analyst, author, speaker, consultant, and editor.  

 

Tom works from his home in the Napa Valley in California. He can be reached at ITincendiary.com.

 

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: