Enterprise Solutions- Briefs
Tuning to wireless
ERP vendor SAP plans to offer executives on the move the ability to receive alerts and updates about their business through mobile phones and pagers, the company announced.
Executives using the company's Internet-enabled mySAP.com ERP product will be able to specify a subset of business alerts which will be sent to them through wireless applications.
Sybase Australia has announced the general availability of the latest version of its OpenSwitch continuous application availability software.
OpenSwitch 12.0 is available on Solaris and NT platforms.
Meanwhile, the HP-UX and IBM-AIX products, currently under development, are scheduled to be market-ready before the end of the year.
Clarifying the front office
Following an investment of over $5 million, Fujitsu Australia's IT&T Infrastructure Systems and Services offerings will now incorporate modules from call centre software com-pany Clarify's eFrontOffice product.
As a result, Cambridge Technology Partners is now conducting a controlled rollout of Clarify's ClearSupport, ClearContracts and ClearExpress components across the full range of Fujitsu's service customers in the IT&T Infrastructure Systems and Services program.
Partnering to relieve backup
Storage software vendor Veritas has secured a deal to supply enhanced storage management capability for NCR's Open Teradata Backup program. Together the two have engaged in a licensing, development and sales agreement to improve the quality and reliability of storage management for MP-RAS (UNIX) and Windows NT customers with the use of Veritas' NetBackup product.
To be sure to be secure
Enterprise security vendor ISS has released a new version of System Scanner, its proactive security assessment product.
SystemScanner Version 4.0 is designed to provide infrastructure managers with an `inside-out' view of their systems. This allows for companies to view their entire enterprise infrastructure and patch potential security leaks as they are uncovered according to ISS. The product establishes a baseline and then manages it by identifying any deviations from that baseline that may signify a security issue.