Feeds

Salesforce.com uses Force to disappear

Not the interface you're looking for

High performance access to file storage

Salesforce.com's incredible disappearing act will continue next week the announcement of its latest platform and tools initiative to target developers.

Silicon Valley's on-demand poster child will kick off its annual Dreamforce event in San Francisco, California, by unveiling a hosted development environment that lets ISVs build applications on its AppExchange market minus the usual Salesforce.com branding.

Called Force.com, and due in 2008, the environment consists of the Visualforce interface to build and customize UIs. Visualforce will contain components and tools for developers to build and customize interfaces and UI behaviors and use HMTL, Flash, AJAX and Salesforce.com's own Apex language.

Squeezing out the news ahead of Dreamforce, Salesforce.com called Force.com its most important release to date, because it enables developers to build the interface they want for any situation.

Adam Gross, vice president of developer marketing, said tactfully that Force.com would "ease the branding woes of current developers".

Translated, that means developers and independent software vendors (ISVs) packing out Salesforce.com's AppExchange marketplace are getting tired of having their benefactor's logo and branding in their customers' faces, when their own could be there.

No doubt, ISVs will also welcome greater freedom to customize their software to the customer's needs, and the ability to make hosted applications resemble the interfaces of more-familiar on-site software or existing offerings.

Force.com is Salesforce.com's latest withdrawal from the public-facing side tof ApexExchange and its platform service. In April Salesforce.com announced Platform Edition, which lets users install and customize AppExchange applications but without the company's trademark CRM elements. That followed the similar AppExchange OEM Edition last year.

The editions enable users to tap Salesforce.com platform's underlying data model, security architecture, interface, version tracking capabilities and meta-data.

As with Force.com, Platform Edition and OEM Edition have been designed to turn Salesforce.com into a provider of hosted business applications by going into areas of companies that don't use CRM. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.