Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo, Java IoT, IBM Cloud

@CloudExpo: Blog Post

Setting Apart WebSphere CloudBurst

WebSphere CloudBurst versus generic provisioning solutions

IBM Session at Cloud Expo

From a constrained viewpoint, the WebSphere CloudBurst Appliance serves as a virtualization management solution for WebSphere application environments. In that light, I cannot tell you how many times customers ask me to delineate WebSphere CloudBurst from the other virtualization management solutions that are either out on the market or currently used in their business. I love to hear this request for two reasons:

1)      It signals that many enterprises already practice or are thinking about virtualization in the application environment space.

2)      I have a good answer!

To understand the main delineation between WebSphere CloudBurst and other virtualization management solutions, it is probably helpful to understand what the appliance does! Put simply and shortly, the appliance enables you to create, deploy, and manage virtualized WebSphere application environments. In particular, the deployment phase of that lifecycle equips users with the capability to turn a selected application environment (represented by a WebSphere CloudBurst pattern) into a collection of one or more virtual machines using special virtual images shipped on the appliance.

Once users hear this, they usually ask, "Why do I need WebSphere CloudBurst to do this? Couldn't I achieve the same results using my own virtual image and management solution?" The same type of question applies to almost any kind of vendor solution. Of course you could potentially achieve something close to the same result on your own. I mean, not long ago most organizations were essentially writing their own ESB applications. This means then that asking why/if you need WebSphere CloudBurst is the wrong question. Instead, you should ask, "Why would I want WebSphere CloudBurst?"

The answer to that is decreased time to value and cost of ownership for your virtualized WebSphere environments. Consider that you are going down the road of creating virtual images for your WebSphere application environments, and you plan to provision those images from a general-purpose management solution. This means that you will have to provide quite a bit of scripting that tells the management solution how to interact with the software inside the virtual machines because to the management system, the virtual machine is a black box.

With WebSphere CloudBurst the virtual machine is anything but a black box. The appliance comes with the knowledge necessary to administrate and interact with the WebSphere software running inside the virtual machine. If you are familiar with WebSphere software, this means the appliance can do things like update hostnames for application nodes (important when reusing virtual images), federate nodes into cells, create application server clusters, tune the JVM for performance optimization, apply fixes, apply upgrades, and more all without the user needing to supply one line of custom scripting!

The fact that WebSphere CloudBurst comes with this out-of-the-box capability means you can avoid the significant investment in creating and testing these types of scripts in the first place. In addition, your cost of ownership with respect to this virtualized approach to WebSphere environments is significantly lower because IBM provides the support for these automated administration actions. You do not have to dedicate resource to supporting and updating administration scripts over time.

In addition to this out-of-the-box WebSphere intelligence, I cannot stress the value of WebSphere CloudBurst patterns enough. Patterns are the unit of deployment in WebSphere CloudBurst and they represent your complete application environment. This includes the topology of the environments (the kinds of nodes and the relationship between them) as well as your custom configuration (applications, application resources, tuning, etc.). This patterns approach allows you to codify your infrastructure, save it, and deploy it repeatedly with consistent results.

Patterns also provide a very effective abstraction from the underlying infrastructure. Regardless of the infrastructure to which you will deploy your pattern, you build and edit it the exact same way. This means, for instance, that you do not have to be an expert on the IBM pSeries platform in order to deploy a WebSphere environment there. Simply build your pattern, select the underlying image that will serve your pattern (which implies the platform), and point at the target infrastructure. WebSphere CloudBurst and its virtual images encapsulate platform specific knowledge that will transform your pattern into a running, integrated, and optimized virtualized WebSphere environment.

If you are a WebSphere user and you have not yet heard about the appliance, check out this brief introductory article. If that article does not answer your questions, you can reach me on Twitter @damrhein.

More Stories By Dustin Amrhein

Dustin Amrhein joined IBM as a member of the development team for WebSphere Application Server. While in that position, he worked on the development of Web services infrastructure and Web services programming models. In his current role, Dustin is a technical specialist for cloud, mobile, and data grid technology in IBM's WebSphere portfolio. He blogs at http://dustinamrhein.ulitzer.com. You can follow him on Twitter at http://twitter.com/damrhein.

CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
Mid-sized companies will be pleased with StorageCraft's low cost for this solution compared to others in the market. There are no startup fees, our solution has a predictable monthly cost, highly competitive pricing and offers ongoing value for our partners month after month. By enabling pooling and StorageCraft's 30-days of free virtualization the company removes several concerns surrounding machine size management and disaster recovery testing costs that add to the complexity of implementing a disaster recovery solution. In addition, their One-Click orchestration makes it simple to recover when needed, as all the work to setup a network and different connections is already complete.