Extends service-oriented architecture middleware and services to private clouds
IBM® Workload Deployer is a hardware appliance that provides access to IBM middleware virtual images and patterns to more easily, quickly and repeatedly create application environments that can be published and managed in a security-rich private cloud.
This product works seamlessly with IBM WebSphere® Application Server Hypervisor Edition, which is optimized to run in virtualized hardware server environments including IBM z/VM®, IBM PowerVM® on IBM AIX® and VMware ESX.
IBM Workload Deployer:
- Reduces costs by helping you deploy, manage and maintain application environments in a security-rich private cloud.
- Increases agility and time to value by providing virtual images and patterns that can speed application deployment and reduce setup time for IBM WebSphere environments.
- Reduces risk and increases repeatability by incorporating more than 10 years of management experience for cost-effective, rapid and repeatable application deployment.
- Optimizes administration within virtualized infrastructure.
- Enhances security throughout the entire infrastructure lifecycle.
- Can help reduce hardware, power and cooling costs by using shared virtualized infrastructure and enabling higher hardware usage rates in a private cloud.
- Reduces the resources and time required to configure and administer the IBM middleware environment.
- Can significantly reduce software labor hours when compared with manual deployment.
- Can free developers to focus on application enhancements.
- Allows you to seamlessly extend your investment in service-oriented architecture (SOA) into a cloud services environment.
Increases agility and time to value
- Includes WebSphere Application Server Hypervisor Edition virtual images, the IBM Web Application Pattern, IBM DB2® patterns and Hypervisor virtual images and common solution topologies.
- Provides a self-service virtual system management console that sets up and tears down deployed environments based on user input times. Also helps simplify environment setup with the click of a button, which makes running systems available within minutes.
- Supports virtual image customization to include binaries for monitors and corporate governance agents.
- Provides drag and drop tools. They allow you to assemble virtual images, scripts and topologies into customized patterns. They also allow you to create and deploy virtual applications without taking the underlying middleware or virtual images into consideration.
- Integrates fully with development and service management tools from IBM Rational® and IBM Tivoli® for support.
Reduces risk and increases repeatability
- Allows you to publish only best practice, accepted solution topologies for user deployment.
- Allows you to customize environments once, and then capture those exact configurations for redeployment with a single click. This enhances repeatability and reduces the potential for errors.
- Allows you to lock images, patterns and even specific parameters (such as memory size = 1024) to help support identical, repeated deployments.
- Allows you to apply updates to images and patterns once and republish for broader user access. This helps simplify maintenance and management.
- Offers reliability with added appliance failover IBM POWER7® support.
- Provides intelligent placement algorithms to optimize resource use based on cloud activity.
- Tracks and reports usage statistics based on user and groups using virtual images and patterns. Provides management reports for internal chargeback purposes.
- Supports Representational State Transfer (REST) application programming interfaces (APIs) for standards-based integration into existing data center management software including Tivoli.
- Provides an enhanced level of dynamics through service-policy-based management. This allows for the enforcement of health policies and response time goals, and managing the rollout of new application versions.
- Provides an appliance that serves as an encrypted vault where images, patterns and permissions are stored. This appliance is tamper-resistant and has a self-disabling switch, which is triggered if the appliance cover is removed.
- Provides granular access controls, allowing administrators to restrict visibility, pattern creation privileges and deployment rights to individuals and groups.
- Integrates with existing Lightweight Directory Access Protocol (LDAP) directories to tie into existing access control lists.
- Allows passwords for virtual systems deployed to be set at the time of deployment. This helps guarantee that root access is only given to credentialed parties.
IBM Workload Deployer resources