Feeds

When Flex met Apex

Adobe and Salesforce.com announce Flex tool for Apex platform

Internet Security Threat Report 2014

Following hard on heels of last week's move into content management, Salesforce.com has joined forces with Adobe to offer a Flex Tool kit for its Apex development platform.

Launched today at Web 2.0 Expo in San Francisco, the two vendors say the new toolkit enables developers to build so-called ‘rich Internet’ applications using Flex features and deliver them as on-demand applications through Apex.

Adam Gross, vice president of developer marketing at salesforce.com, says the tool brings advantages to developers in both communities. Apex developers will be able to create more interesting applications using Flex features such as drag and drop and rich media; while Flex developers will be able use Apex's embedded mashup features and incorporate services and content from the Web.

“With these tools, developers can build mashups based on Apex applications. Under the hood, we have worked with Adobe to make all the Apex services available to Flex so you can get native access to the Web content,” Gross explains.

The Flex elements of Apex applications work as browser-based components so they can be deployed without the need for additional software infrastructure. They can also be packaged and redistributed through the Apex AppExchange.

Centive, developer of the on-demand sales compensation package Compel, is one the first users of the toolkit. Bob Conlin, chief marketing officer at Centive says: “We plan to leverage the Adobe Flex Toolkit for Apex to develop additional applications for the AppExchange that will enhance the value and end-user experience we seek to provide our customers.”

Gross says that a version of the Flex toolkit is also under development to work with Adobe's Apollo operating environment. “This is still experimental at the moment. But the idea is to provide the same features so you can build Apollo counterparts to Apex applications using the same tool.” ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.