Ask a question?
  • Contact Us
  • Support Case System
  • Support Forum

Product Value Proposition

Situation Analysis

Since the beginning of the modern IT era, each period of innovation has inadvertently introduced its fair share of Data Silos. The driving force behind this anomaly remains an over emphasis -- at solution selection time -- of the role of monolithic applications that fail to separate Data Access, Representation, Presentation, Identity, and Storage/Persistence. The rise of the Internet, and its exponentially growing enclave known as the World Wide Web, are bringing the intrinsic costs of the aforementioned application architecture anomaly to bear, in manner unanticipated by many. For example, the emergence of network oriented solutions across the realms of Enterprise 2.0 based Collaboration, Web 2.0 based Software as Services, combined with the overarching influence Social Media, are producing more data-- across silos -- than people can effectively process.

As is often the case, a variety of problem and product monikers have emerged for the data access and integration challenge outlined above, contemporary examples include: Enterprise Information Integration, Master Data Management, and Data Virtualization. Labeling aside, the fundamental issues the belie Data Integration boil down to the following:

  • Data Model Heterogeneity
  • Data Quality (Cleanliness)
  • Semantic Variance across Contexts (e.g. weights and measures).

Effectively solving today's data integration challenges requires a move away from monolithic application architeture to loosely coupled network centric application architecture; basically, we need a ubiquitous network centric application protocol that lends itself to loosely coupled data orchestration, as the basis for redefining the art of application development and deployment.

The ubiquitous World Wide Web is built around a network application protocol called: HTTP. A protocol that intrinsically separates Data Access, Representation, Presentation, Identity, and Storage/Persistence, thereby enabling the following:

  • Use of Generic HTTP URIs for Data Object (Entity) Identifiers
  • Identifier Co-reference such that different Data Object Identifiers could reference the same Data Object
  • Entity-Attribute-Value Model for describing Data Objects
  • Use of HTTP URLs to Identify Locations of Resources that bear (host) Data Object Descriptions (Representations)
  • Data Access mechanism for retreiving Data Object Descriptions from persistent or transient storage locations.

Virtuoso Benefits

Virtuoso is uniquely architected to address today's escalating Data Access and Integration challenges without compromising performance, security, or platform independence. At its core lies an unrivalled committment to industry standards combined with unique technology innovation that transcends ersthwhile distinct relams such as database management, data access middleware, content management, web application deployment and web services, and messaging.

Post installation of Virtuoso, you are well positioned to commence the process of generating HTTP based Data Objects as a by product of powerful data virtualization that transcends a variety of data sources and data representation formats. These benefits apply to user profiles and paradigms that include: Information & Knowledge Workers, Systems Integrators & Architects, Database Administrators, Distributed Collaboration & Social Media, Cloud Computing, and Application Development.

Benefits Summary

  • Enterprise Agility - Mix & Match best-of-class combinations of Operating Systems, Programming Environments, Database Engines and Data-Access Middleware when building or tweaking your IS infrastructure, without the perennial impedance of vendor-lock-in

  • Data Model Dexterity - by supporting multiple protocols and data models in a single product, it protects you against costly vulnerabilities such as: perennial acquisition and accumulation of expensive data model specific DBMS products that still operate on the fundamental principle of "proprietary technology lock-in" at a time when heterogeneity continues to define technology landscape

  • The most cost-effective option for exploiting emerging frontiers such as socially enhanced enterprise collaboration through its ability to provide single access (and single-signon) to a plethora of Web 2.0 style social networks, Web Services, and Content Management Systems

  • The ability to rapidly assemble 360-degree conceptual views of data across internal line-of-business applications and/or external data sources (unstructured, semi-structured, or fully structured)

  • Unrivaled performance, scalability, without compromising performance

  • Enterprise Agility - Mix & Match best-of-class combinations of Operating Systems, Programming Environments, Database Engines and Data-Access Middleware when building or tweaking your IS infrastructure, without the perennial impedance of vendor-lock-in

  • Data Model Dexterity - by supporting multiple protocols and data models in a single product, it protects you against costly vulnerabilities such as: perennial acquisition and accumulation of expensive data model specific DBMS products that still operate on the fundamental principle of "proprietary technology lock-in" at a time when heterogeneity continues to define technology landscape

  • The most cost-effective option for exploiting emerging frontiers such as socially enhanced enterprise collaboration through its ability to provide single access (and single-signon) to a plethora of Web 2.0 style social networks, Web Services, and Content Management Systems

  • The ability to rapidly assemble 360-degree conceptual views of data across internal line-of-business applications and/or external data sources (unstructured, semi-structured, or fully structured)

  • Unrivaled performance, scalability, without compromising performance.