Feeds

Sybase squeezes more SAP into devices

Mobie move

3 Big data security analytics techniques

With Oracle and SAP going at each other last week, Sybase has updated its Unwired Enterprise strategy to help put more SAP business applications into the field.

Sybase is today expected to announce Unwired Accelerator 8.0, extending its support for SAP by simplifying connection to mobile devices and offering greater customization.

According to SAP, Unwired Accelerator 8.0 gives developers greater scope to tailor the SAP display to suit different users' needs and the requirements of a limited screen. Unwired Accelerator 8.0 supports MySAP 2005 back to R/3 4.0.

Mobile access to SAP customer relationship management (CRM) is one of the Sybase product's strongest markets, according to Unwired product director Neil McGovern. So far, it doesn't see Sybase has plans to support Oracle.

McGovern noted SAP has done a "good job" in exposing its APIs while a "mish mash" of different techniques had been used in Oracle's applications. He noted, though, PeopleTools, part of the PeopleSoft suite, and the Unix version of JD Edwards had strong interfaces Sybase could tap.

Oracle has, of course, spent the better part of two years and $20bn buying companies with different code bases. Oracle is trying to knit those together using its web services-based Fusion Middleware architecture, due in 2008.

Unwired Accelerator is part of Sybase's Information Anywhere suite, meaning applications using Sybase's platform share one device management and security model. According to McGovern, this makes it easier for IT shops to rollout and manage a mobile infrastructure because they don't have to rely on separate security or management systems for different applications.

Other applications supported by Unwired Accelerator 8.0 include Business Objects XI, Crystal Reports XI, Lotus Notes 6.5 and BMC's Remedy Service Desk. Also provided is an Eclipse plug in, and server push and differential synchronization for BlackBerry, Symbian and Windows Mobile devices.®

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.