• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Relativity Teams with ILOG for Business Rule Modernization

    July 22, 2008 Alex Woodie

    Relativity Technologies, a developer of tools to allow programmers to gain a better understanding of applications, has teamed up with ILOG, a developer of business rules management systems, to help customers modernize their legacy systems, the two vendors announced last week.

    With its Modernization Workbench, Relativity is in the business of “knowledge mining.” The software enables owners of so-called “legacy” applications running on System i, System z, Unix, and Windows systems, to dig deep into the code to see how the various components of the application work and where the business logic is buried. After unearthing this crucial bit of information, organizations are better prepared to modernize or migrate their legacy apps.

    ILOG, on the other hand, is in the business of business rules. In other words, ILOG develops products classified as business rule management systems (BRMS) that basically separate the execution and flow of business logic from the applications themselves. ILOG addresses one of the most pernicious problems of application modernization, which is the tendency to hard code business rules and logic into the legacy applications. By separating the rules, organizations are better prepared to incorporate their legacy applications in the new service orientated architectures (SOAs) of the future.

    By integrating their respective tools–Modernization Workbench on Relativity’s side, and JRules and Rules for COBOL on ILOG’s side–the two companies hope to make it easier for users to extract business rules from legacy apps, and then rejuvenate those rules through more flexible, SOA-based BRMS services.

    ILOG’s JRules works in Java environments, while Rules for COBOL works, as you might suspect, in COBOL environments. ILOG also develops BRMS products for managing business rules in Microsoft .NET and C++ applications, but these products are not part of the Relativity partnership.

    Desmond Delandro, vice president for strategic alliances with ILOG, says this partnership has “clear value” for CIOs. “Now, organizations can shift from brittle, poorly understood applications to highly adaptable and maintainable systems, while leveraging the intellectual property invested in their existing application portfolio,” Delandro says.

    RELATED STORIES

    Relativity Technologies Updates Modernization Suite

    Relativity Technologies Grows Fast from Legacy Application Modernization

    Relativity, USTRI Launch iSeries Modernization Initiative



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Computer Measurement Group:  CMG '08 International Conference, December 7-12, Las Vegas
    SafeData:  FREE White Paper - IBM iSeries Recovery Options: An Executive Guide
    COMMON:  Join us at the Focus 2008 workshop conference, October 5 - 8, in San Francisco, California

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Sun and IBM Deliver 1 TB Tape Drives, Argue About Speed Control the Library List from a SQL Server Linked Server Definition

    Leave a Reply Cancel reply

Volume 8, Number 28 -- July 22, 2008
THIS ISSUE SPONSORED BY:

Aldon
ProData Computer Services
Seagull Software
Bytware
Essex Technology Group

Table of Contents

  • CNX Aims to Streamline Web 2.0 Development for i OS with Valence
  • Resolution Moves Database Automation Forward
  • IBM Delivers ID Management as a Service with Tivoli FIM
  • Micro Focus Moves NetManage Acquisition Forward
  • ARCAD Opens New Office in Singapore
  • Agilysys Sells Hospitality Suite to New Laotian Casino
  • English Manufacturer Extends ERP for Chinese Expansion
  • VAI: 30 Years Old, and Counting
  • Relativity Teams with ILOG for Business Rule Modernization
  • i OS Products on Display in Upcoming Vendor Webcasts

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26
  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.