Feeds

Sybase touts distributed data integration

Suite success

Secure remote control for conventional and virtual desktops

Sybase is combining integration, search and workflow under a strategy geared towards improving the way customers retrieve information from distributed sources.

The company has announced Sybase Data Integration Suite, combining features from acquired and existing Sybase products onto a single metadata model and repository.

Sybase Data Integration Suite will offer replication and federation of data, real-time events management for databases, and unstructured data search from the company's Replication Server and Unwired Orchestrator, and Avakai, ISDD and Solonde properties.

Sybase hopes to extend the ability for developers and business managers to model metadata and workflows using its existing PowerDesigner data modeling tool. The objective is to help organizations build data-rich applications for business intelligence, customer relationship management and regulation.

Sybase is tapping into today's themes of service oriented architecture, business process management, and information management. The company hopes its expertise in data integration and mobile computing will give it an edge over rivals.

Sybase's information technology solutions group vice president Kathleen Schaub told The Register approaches to data integration from Oracle, SAP and Microsoft create "islands of data" based around each companies' applications. IBM, according to Schaub, is on the right track by taking an architectural approach, but tries to solve SOA, BPM, and information management using expensive consulting services.

Schaub said: "We will differentiate ourselves through metadata, modeling and management, and design direction to create tools in software that don't require a lot of services."

The data integration suite will provide tools to model sources and mapping that draw on the single metadata model and repository.

The first version of Sybase Data Integration Suite, due in the fourth quarter, will wrap up Sybase's offerings in replication, data federation and the ability to search unstructured data. The real meat will come a year later when Sybase puts its extract, load and transform software (acquired from Solonde) on the same data repository along with a single security model, and provides additional capabilities for rules and business activity monitoring. ETL is currently a stand-along product, Schaub said.

The third phase is due in 2008, when Sybase increases performance, adds more platform support, and additional management and governance capabilities. ®

The essential guide to IT transformation

More from The Register

next story
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.