Feeds

Sybase touts distributed data integration

Suite success

Top three mobile application threats

Sybase is combining integration, search and workflow under a strategy geared towards improving the way customers retrieve information from distributed sources.

The company has announced Sybase Data Integration Suite, combining features from acquired and existing Sybase products onto a single metadata model and repository.

Sybase Data Integration Suite will offer replication and federation of data, real-time events management for databases, and unstructured data search from the company's Replication Server and Unwired Orchestrator, and Avakai, ISDD and Solonde properties.

Sybase hopes to extend the ability for developers and business managers to model metadata and workflows using its existing PowerDesigner data modeling tool. The objective is to help organizations build data-rich applications for business intelligence, customer relationship management and regulation.

Sybase is tapping into today's themes of service oriented architecture, business process management, and information management. The company hopes its expertise in data integration and mobile computing will give it an edge over rivals.

Sybase's information technology solutions group vice president Kathleen Schaub told The Register approaches to data integration from Oracle, SAP and Microsoft create "islands of data" based around each companies' applications. IBM, according to Schaub, is on the right track by taking an architectural approach, but tries to solve SOA, BPM, and information management using expensive consulting services.

Schaub said: "We will differentiate ourselves through metadata, modeling and management, and design direction to create tools in software that don't require a lot of services."

The data integration suite will provide tools to model sources and mapping that draw on the single metadata model and repository.

The first version of Sybase Data Integration Suite, due in the fourth quarter, will wrap up Sybase's offerings in replication, data federation and the ability to search unstructured data. The real meat will come a year later when Sybase puts its extract, load and transform software (acquired from Solonde) on the same data repository along with a single security model, and provides additional capabilities for rules and business activity monitoring. ETL is currently a stand-along product, Schaub said.

The third phase is due in 2008, when Sybase increases performance, adds more platform support, and additional management and governance capabilities. ®

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.