Feeds

Adobe and BEA team on RIAs

Java package

Internet Security Threat Report 2014

BEAWorld BEA Systems is teaming up with Adobe to help developers build and serve up rich internet applications (RIA).

The Java middleware provider will bundle Adobe's Flex Builder 2 with the BEA Workshop Studio programming environment, while Adobe will distribute evaluation licenses of BEA's WebLogic Server with the Adobe LifeCycle Enterprise Suite (ES).

The Flex Builder 2 and Workshop combo is due later this year, and LiveCycle and WebLogic server are scheduled for early 2008.

LiveCycle is Adobe's integrated Java 2 Enterprise Edition (J2EE) package for building electronic forms and process management with document security and auditing.

The goal for Adobe's RIA strategy is to deliver rich online applications on the desktop outside the browser, while enabling these applications to access local resources, such as documents. Driving RIA is the Adobe Integrated Runtime (AIR), which lets developers re-use skills in Flash, HTML, AJAX and Java.

BEA said the combination of Flex Builder and Workshop Studio will help developers to quickly and easily build new applications such as interactive dashboards. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.