IBM also announced the release of WebSphere Extended Deployment Version 5.1, which "brings into WebSphere capabilities for automatically managing the workload," said Robert LeBlanc, IBMs new general manager of application and integration middleware. "It adds the ability to look at a WebSphere application as a single application, but you can add servers in real time and add the ability to put priority on a workload." IBM and Cisco Systems Inc. are also teaming to automate security policy enforcement as well as remediate at-risk computing devices. The two vendors expanded their alliance to integrate IBM Tivoli Security Compliance Manager with the Cisco Secure Access Control Server. With the new integration, users can define policies that are sent to their remote systems and cached."Security Compliance Manager then uses Tivoli Provisioning Manager to automate the remediation of that," Cronin said. IBM now has some 50 products and 415 features that include autonomic computing functions, officials said. Read about IBMs Solution Installation for Autonomic Computing technology. As users exploit those functions in a piecemeal fashion, their success, and the actual benefits derived from autonomic computing, will largely go unnoticed. But over time, as IBM continues its rollout, more large success stories will emerge, according to industry experts. "Its going to be one of those overnight successes that takes 10 years," quipped Jasmine Noel, principal at Ptak, Noel & Associates, in New York. Big Blues Autonomic Milestones
October 2001: Publishes autonomic computing manifesto with call to action and eight defining characteristics.
February 2002: Forms autonomic computing unit.
April 2003: Publishes autonomic computing blueprint.
May 2003: Acquires Think Dynamics for orchestrated provisioning.
October 2003: Teams with Cisco to develop open-software self-healing technologies.
July 2004: Debuts eFuse chip-morphing technology.
Check out eWEEK.coms for the latest utility computing news, reviews and analysis.
"When [a remote] system connects to the network and [the Secure Access Control Server] responds, Tell me about yourself, we send that information. If the system is not compliant, the Cisco device will isolate that end system so it cant get into the internal network," said Don Cronin, corporate security strategy chief technologist for Tivoli, in Raleigh, N.C.