Feeds

SAP curbs its enthusiasm with iPhone

Data access without the entry

Top 5 reasons to deploy VMware with Tegile

Having been rapped on the knuckles for hacking Apple's iPhone, SAP is playing by the rules to make its next customer relationship management (CRM) software work with Apple's handset.

Bob Stutz, a senior vice president for SAP’s CRM biz, has unveiled SAP CRM 2007 with a web rather than a portal-based interface to work on Apple's brick.

Stutz has been quoted saying the SAP CRM 2007 interface would let end users load business contacts, information on sales prospects and account data onto the device. The interface will provide an "iGoogle-like" front end to its enterprise software, SAP said.

An SAP spokesperson, though, told Reg Developer the SAP CRM 2007 applications unveiled this week work inside the iPhone’s Safari browser and do not access the iPhone's local hardware or software resources.

"What ever is on the iPhone is basic. The hardcore CRM is not there. It's meant to be a convenience [for sales people in large organizations like Intel]," he said.

SAP is apparently sacrificing potential functionality and limiting itself to working inside the browser after Apple quoted the Digital Millennium Copyright Act (DMCA) for hacking the iPhone to make a proof of concept work on the device.

SAP's vice president of imagineering Denis Browne told El Reg in September that the community wanted the iPhone to be "open and available" with a first step being an iPhone SDK and improved support for Flash and Java. SAP on Wednesday called Apple one of its closest partners, adding Apple is standardizing on SAP as a global enterprise partner.

In addition to the iPhone, SAP is also being made available on the Blackberry, Palm Trio and Windows. SAP has long been criticized for being weak on mobile access.®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.