Feeds

Tibco ties BPM to SOA

Eclipse-based tools to automate the SOA revolution

Choosing a cloud hosting partner with confidence

Hot combinations of three letter acronyms (TLAs) can set the pulse racing, and the current top pair have to be BPM and SOA (that's business process management and service oriented architecture for any visitors from Alpha Centauri).

With the latest release of its iProcess Suite, Tibco Software has succeeded in bringing these two hot marketing concepts together in the same headline.

Cynicism aside, version 10.6 of iProcess Suite is a serious attempt to tie high level BPM into the SOA universe and bring a greater degree of automation to the development of new wave applications. The iProcess Suite is a development of the BPM component Tibco picked up from its acquisition of Staffware in 2004 and is now well tried and tested.

Tibco has progressively pushed it towards SOA and, in this release, it claims to have "improved role-based usability, more granular process monitoring capabilities and scalability to manage a broader array of critical business processes".

EMEA product marketing manager Catherine Lynch translates: "In version 10.5 we had some integration points between iProcess and Business Works, our enterprise service bus platform. But with 10.6 we have increased the integration to cover things like audit trails, the ability to query case numbers and graft sub procedures. And because it is bi-directional integration you can call up low-level services - such as a credit check."

She goes on to say that the new release provides links with Tibco's Eclipse-based Business Studio modelling tool to give business users and IT technicians a common base to work from. "The role-based interface means that both groups can use the same underlying models. The business user role just hides the technical detail."

Lynch says the free downloadable "community" version of Business Studio has attracted 12,000 hits in the last five months. ®

Internet Security Threat Report 2014

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.