• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • SOAs Are Being Implemented at Large Companies, Evans Data Says

    April 17, 2007 Alex Woodie

    You’ve undoubtedly heard of services oriented architecture (SOA), the new “loosely coupled” Web services development model that is sweeping the IT nation. While there have been boatloads of hype surrounding SOA, it also appears that the SOA technique is finding its share of participants, according to a new Evans Data survey that finds that enterprise-level SOA deployments will double over the next two years.

    According to a survey of more than 300 developers at enterprise-size companies, nearly 25 percent of organizations already have an SOA in place. What’s more, over the next 24 months, another 28 percent of respondents plan to roll out an SOA, according to Evan’s latest Corporate Development Issues survey. Put another way, that means more than half of enterprise-level organizations will have SOAs in place by 2009.

    The Santa Cruz, California, research firm also looked into the adoption of Enterprise Service Busses (ESBs), the powerful server-based applications that function as the I/O switchboards of SOAs. According to Evans, 15 percent of respondents have adopted ESBs, and another 15 percent will have adopted ESBs over the next two years.

    These numbers should be cause for celebration among vendors writing next-generation integration and development tools, according to John Andrews, president of Evans Data. “The SOA software market is poised for healthy growth,” he says. Enterprise integration and the need for flexible business processes continues to drive the demand for SOA as a viable and popular option to achieving competent IT infrastructure.”



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Computer Keyes:  Rapidly convert *SCS printer files into black and white or full color PDF documents
    COMMON:  Join us at the 2007 conference, April 29 – May 3, in Anaheim, California
    VAULT400:  Securely archive data with Instant Back-Up & 24x7 Recovery

    IT Jungle Store Top Book Picks

    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Virtualization Can Hurt Security, Gartner Says Calling SQL Functions Directly From a High Level Language Program

    Leave a Reply Cancel reply

Volume 7, Number 15 -- April 17, 2007
THIS ISSUE SPONSORED BY:

LANSA
Aldon
COMMON
Computer Keyes
Twin Data

Table of Contents

  • Global Hires Beer, Rolls Out New Web Site
  • Oracle Declares a ‘Renaissance’ for J.D. Edwards World
  • Shield Launches ‘DR for the Masses’
  • IBM Addresses Object-Level Security with New Tool
  • More Details Emerge on Query/400’s Java-Based Replacement
  • LogLogic 4.0: A View to a Log
  • Raz-Lee Signs BOSaNOVA to Resell Security Software
  • Ericom Supports Windows Vista with PowerTerm WebConnect
  • EXTOL’s New ‘EDI Appliance’ Based on System i Express Model 515
  • SOAs Are Being Implemented at Large Companies, Evans Data Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle