Push Technology Releases Diffusion Intelligent Data Platform 6.1
May 02, 2018

Push Technology announced the release of the Diffusion Intelligent Data Platform version 6.1.

The platform is purpose built to simplify data management, optimization, and integration for enterprises building data-dependent, and often time sensitive applications. Diffusion is used by developers in companies worldwide to easily create and manage data models that fit the requirements of their businesses.

Diffusion 6.1 introduces major data lifecycle and ownership functionality, that combines with the rich set of dynamic data model creation, management, and distribution tools in the platform. The new functions further simplify and reduce development time for companies building mission-critical business applications.

The Diffusion Intelligent Data Platform uses uniquely identified data streams, called Topics, to deliver data to clients via a pub/sub interaction model. When a topic is updated with a new value, it is sent to all topic subscribers.

Automatic Topic Removal enables developers to dynamically remove redundant or outdated parts of their application’s data model – automatically based upon user-defined conditions, thus, substantially simplifying the development process.

Now, developers can set an automatic, conditional removal policy. An Automatic Topic Removal policy can combine conditions such as: elapsed time; the number of subscribers to the topic; the last time the topic was updated; and session properties of the topic's subscribers. The Diffusion platform monitors these conditions and will automatically remove the topic when the criteria of the policy are satisfied. If a topic is removed, clients are informed of the removal.

The benefits of Automatic Topic Removal are:

- Reduction in application development time by eliminating the need to develop important housekeeping code to perform the tasks required to remove obsolete data and data streams in their applications.

- Application simplification and optimization because busy Enterprise applications can create millions of topics over time.

It is often useful for an application to have the ability to communicate with a single user where It is critical not to expose the data to other users – for example in an online or mobile banking application. However, even if the server enforces access via security control APIs, scale can be a challenge. Diffusion 6.1 addresses and simplifies this development challenge with the new Topic Ownership feature, which provides enhanced security functionality using fine-grained access control on a per-topic basis. Topic Ownership associates a topic with a security principal. A session authenticated with the security principal is automatically granted the ability to read, modify, and/or update permissions for the topic, in addition to any permissions granted by the security store. All other sessions only have the permissions granted by the security store. A control session can create private topics owned by specific principals.

Automatic topic removal and topic ownership are designed to work together – for example developers will use a removal policy to remove private topics on pre-defined conditions. Automatic topic removal and topic ownership are supported by the Diffusion client SDKs and are compatible with platform’s convenient topic replication functionality.

The 6.1 release also includes a new .NET Core SDK in addition to the rich range of SDKS already included with the Diffusion platform (Java, Javascript/NodeJS, iOS/Mac OS, Android, .NET, and C/C++). .NET Core is particularly useful if development projects must run cross-platform, targets microservices, uses Docker containers, must be high performance and scalable, and/or requires side-by-side installation of different versions of the .NET Core runtime on the same machine.

Sean Bowen, CEO of Push Technology, sums up the new offering: “Our guiding principal is to simplify and reduce Enterprise application development by providing a single, unified platform to manage, optimize, and integrate data for application developers. The enhancements introduced in 6.1 further simplify the application development process and reduce the cost of managing infrastructure. By freeing up resources, we enable companies to focus on tasks that generate value for their business.”

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this