Last Weeks Acquisition By Software AG

Last Weeks Acquisition By Software AG

Small and medium-sized businesses have something new to be excited about. Software AG who last week purchased LongJump, a PaaS (Platform as a Service) vendor who in the past has worked with giants like Cisco, AT&T, and Gannett to provide white-labeled PaaS. The terms of the deal were undisclosed, but Software AG says that it will reveal the details of how it will weave LongJump’s technology into its own middleware portfolio when they are ready.

LongJump uses open-source elements including MySQL database and Tomcat application server, so it is compatible with a majority of the systems out there without needing additional tweaking. What makes LongJump important for small and medium businesses is its ability to allow users to utilize an already defined set of models and templates for creating cloud applications without the need of coding. This immensely helps businesses to minimize IT expenditure. This was reiterated during Software AG’s announcement.

Users have the choice of a hosted version which is being served through Rackspace or they could self- host in their own data center or on a cloud hosting service of their choosing. This offers up a lot of flexibility for the customers and will allow them to keep existing ties with other partners. Another great feature is the ability to white-label LongJump’s services and use their own branding and design to the core elements, and of course market it as their own service.

The deal coincidentally comes in the same week as the launch of Pivotal, a new company directly from VMware and its parent EMC. Pivotal is another PaaS provider using technologies from both parents which gives customers to replicate IT operations from tech giants like Google, AWS, and Facebook.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

What Should SMEs Do To Prevent Common Mistakes?

What Should SMEs Do To Prevent Common Mistakes?

Spending And Planning Wisely Overview – Billions of pounds from valuable IT and communication (ICT) budgets are wasted each year due to common mistakes in the market. These are some of the pitfalls you should avoid. With small businesses (especially start-ups with online ambitions) relying more and more on their understanding and utilisation of ICT, it’s…

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud Earlier in the month I talked about Bouillabaisse a fish stew or as I called it Cloud Bouillabaisse both are heavily reliant on what you put in it. Building on that food theme (I have to stop writing these blogs at dinner time…) I would like to talk about cloud…

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Destroying Cloud Data In The Age Of Data Multiplication

Destroying Cloud Data In The Age Of Data Multiplication

The Age of Data Multiplication We are surrounded by data, whether in our personal or professional lives with digital elements that are constantly being captured about us. This leads to exponentially increasing volumes of data whether from Internet-connected devices, video, cell records, customer transactions, healthcare and government records. Today, there is a growing awareness and…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising