Bea Systems has announced that its next generation middleware, formerly codenamed Iceberg will be released under the name M3.
The software combines the Bea Tuxedo transaction processing monitor with the Object Broker object request broker, which complies with the Corba standard and which Bea acquired from Digital last year.
Bea is describing M3 as an Object Transaction Server, a new type of middleware that it claims will bring the robustness and scalability of TP monitors to object-based applications. The announcement came on the same day that Microsoft announced links from its own object technology to transaction-based systems (see page 14).
Bea said M3 will run existing Tuxedo applications. On the server, it will initially support only applications written in C++. However, a version that supports server-side Java will be available in an early adopter programme starting this autumn. It will support Enterprise Java Beans.
On the client side, M3 will support COM (Component Object Model) from Microsoft.
Bea lined up support from several tool vendors, including Symantec and 4GL suppliers Compuware, Dynasty Technologies and Prolifics. Database vendors Informix, Versant and Ardent also supported the launch. Unisys said it would resell M3 to run on its servers, including its recently announced Cellular Multipro-cessing systems.
The new product will ship on 24 July. It will be available on most Unix platforms and Windows NT, with other server versions to follow. Pricing starts at $395 (#242) per user.
It is expected to compete with Microsoft's Transaction Server, Sybase Jaguar CTS and Inprise's forthcoming Inprise Application Server. Inprise is building its product on the Visibroker object broker it acquired from Visigenic.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software