sunflash-Distributed to mailing list sun/NC/north-carolina sunflash-Send requests, problems to owner-sunflash@suntri.east.sun.com ---------------------------------------------------------------------------- The Florida SunFlash Third Party Product Announcements SunFLASH Vol 60 #9 December 1993 ---------------------------------------------------------------------------- Abstracts 60.09.A Checkpoint - knowledge-based software management tool Checkpoint is an expandable knowledge-based system for software management that has been proven to positively impact software estimates, quality, and development productivity (26 lines) 60.09.B Configuration Management /Problem Tracking tool - Razor Razor is an integrated tool suite which addresses the related topics of problem tracking and configuration management, and at the extremely aggressive price of $349/floating license. Razor is now available from the Qualix Group. (106 lines) 60.09.C Excel Accesses Sun Programs and Databases I-Kinetics, Inc. today introduced I-Bridge, a family of software products that allows Windows applications to directly access databases, programs, and files on UNIX servers. The initial release of I-Bridge includes adapters for Excel, as well as Ingres, Oracle and Sybase SQL Server databases. (210 lines) 60.09.D Hughes NetLOCK - Software to Secure Network Communications Hughes NetLOCK is a software-based security product that ensures the privacy of computer data communications traveling across local and wide area networks. (88 lines) -------------------------------------------------------------------------------- Details -------------------------------------------------------------------------------- 60.09.A Subject: Checkpoint - knowledge-based software management tool From: shane@spr.com Org: Software Productivity Research Inc. email: sales@spr.com Address: 1 New England Executive Park, Burlington, MA, USA 01803-5005 Phone: (617) 273-0140 Fax: (617) 273-5176 SOFTWARE PRODUCTIVITY RESEARCH SHIPS UNIX VERSION OF CHECKPOINT FOR SUN SPARC WORKSTATION SPR recently began shipping the UNIX/Motif version of Checkpoint, its powerful knowledge-based software management tool for the Sun SPARC family (OS 4.1.3). The new version provides the user with standard state-of-the-art GUI's, fully utilizing the capabilities of Motif under X/Windows to provide mouse-driven, icon-based environments with the ability to view and process data in multiple windows simultaneously. Checkpoint is an expandable knowledge-based system for software management that has been proven to positively impact software estimates, quality, and development productivity by suggesting alternate approaches to development, modeling alternate scenarios with a full range of environmental and product factors, providing performance benchmarks based on both organization-specifc and industry-wide standards, and predicting software costs and schedules. -------------------------------------------------------------------------------- 60.09.B Subject: Configuration Management /Problem Tracking tool - Razor From: shirleyk@qualix.com (Shirley Kumamoto) Product Manager Org: Qualix Group Address: 1900 S. Norfolk St. Suite 224 San Mateo, CA 94403-1151 voice: (415) 572-0200 1-800-245-UNIX fax: (415) 572-1300 Email: info@qualix.com PROBLEM TRACKING, FILE VERSION CONTROL & RELEASE MANAGEMENT AVAILABLE THROUGH SINGLE TOOL SUITE- RAZOR Razor is an integrated tool suite which addresses the related topics of problem tracking and configuration management, and at the extremely aggressive price of $349/floating license. Razor is now available from the Qualix Group. Razor provides the following features: o Problem Tracking The heart of the Razor package is a highly configurable problem racking system. Customized problem forms present themselves on screen as windows, employing text fields, textedit windows, check boxes, choices etc, for whatever information is important to your work group. o File Version Control & Release Management Using either SCCS or RCS as the underlying mechanism, Razor provides an intuitive and insightful window interface to all of the standard version control needs; checking files in/out for edit, parallel development, reporting changes, viewing differences, browsing, etc. Additionally, Razor can track other information such as a team's change commentary and Issue resolution relationships. Extensions built into the system allow it to handle binary generated files with similar ease. Razor provides an easy mechanism for managing and integrating innumerable changes. By defining a 'thread', users and teams can manage the packages they are generating. o Easy Integration & Reporting Through a drag and drop interface, users are able to relate their check-in, check-out, and thread activities to the problem reports in the system. It is this linkage that provides the greatest power of the package. Both managers and engineers have direct insight into not only the changes that are being made, but the issues which are driving them. o Simple architecture makes it easily customizable All of the information managed during the evolution of issues and the development of code is maintained in easily parsed ASCII files. The tool suite is delivered with a robust set of mechanisms for querying this database- however, users are encouraged to write their own query mechanisms, which can be done either through programs, or UNIX shell scripts. The user interface is highly extensible. Each work group can attach programs and scripts either directly to pull down buttons on the main displays, or as 'side effects' of the normal action buttons. For example, a work group could attach a script which sends e-mail each time certain files are checked out. Another group could automatically run metrics analysis programs on files as they are checked back in. o E-mail Interface fits your working style Users may also interact with Razor via an e-mail interface. Problem report input, update and queries can all be performed by team members located remotely. All issues can be directly logged into their Razor database and a ticket number will be automatically returned to the sender for identification and tracking. Additionally, a configurable set of remote users can take advantage of e-mail to do the standard set of version control activities; check files in/out for edits, getting read-only copies, etc. System Requirements ------------------- SunSPARC/SunOS 4.1.1 and OpenWindows 3.0. SunSPARC/Solaris 2.1 in compatability mode. Disk space: 5Mb of file server disk space. Storage needs for the customer generated databases will be installation dependent. Support for HP's and Motif will be available in January of '94, with other platforms to quickly follow. Pricing & Ordering Information ------------------------------ Single user, floating license, quantity one: $349 Volume discounts available Available now! -------------------------------------------------------------------------------- 60.09.C Subject: Excel Accesses Sun Programs and Databases From: Abraham Hirsch Org: I-Kinetics, Inc. Phone: 617-661-8181 x223 Email: ahirsch@i-kinetics.com I-Kinetics Announces I-Bridge(R): New Software Gives MS Windows Applications Direct Access To UNIX(R) Programs And Databases CAMBRIDGE, MA, November 2, 1993 -- I-Kinetics, Inc. today introduced I-Bridge, a family of software products that allows Windows applications to directly access databases, programs, and files on UNIX servers. The initial release of I-Bridge includes adapters for Excel, as well as Ingres(R), Oracle(R) and Sybase SQL Server(TM) databases. The UNIX adapters are available immediately for Sun platforms. A starter system, including a UNIX server module and two Windows client modules is priced at $995. The list prices for the components total $3100 if purchased separately. A limited use demonstration version is also available. I-Bridge products put information directly into a Windows application, such as a spreadsheet, without the user having to manually locate, transfer, or convert it. I-Bridge Windows clients communicate with different UNIX data sources, including different databases, through a single driver with automatic data conversion. I-Bridge helps an information systems staff provide wider access to enterprise data while protecting the operation of those critical resources. "I-Bridge lets non-technical professionals get the data they need, when they want it without having to become SQL, database, file transfer and conversion experts," said Abraham Hirsch, Vice President of Sales and Marketing at I- Kinetics. "I-Bridge is better for end users than ODBC because it can retrieve all kinds of data from different sources, uses the customer's verified SQL, supports all SQL extensions and all future database enhancements including object-oriented extensions, and uses a single communications driver." (ODBC is a Microsoft-developed standard for calling a database communications driver.) Access Data Not In Databases I-Bridge gives Windows applications direct access to data in flat files, or directly output from UNIX programs without intermediate file storage. For example, I-Bridge gives the Excel client the power to run any UNIX program and pipe the results directly into a spreadsheet. This ability to integrate with any UNIX tool, utility, or program makes possible support for many commercial and proprietary applications, and represents a new generation of client/server capabilities for desktop applications. IS Staff Saves Time And Protects Data Assets I-Bridge uses an organization's existing investment in optimized SQL to protect the data sources from potential disruption caused by computationally expensive ad hoc queries. SQL and shell commands are developed and distributed by the IS staff to I-Bridge desktop end-users, or maintained as centrally managed stored procedures that are shared across the enterprise. They can be entered via function calls in the application's macro language or interactively through the I-Bridge Wizard(TM) an interactive user interface tool. Because I-Bridge promotes the use of SQL that has been verified by the information systems staff, it can be used in production applications. With on-demand user access to the data, and user control over the format, requests for report format changes and the printing, copying, and distributing of typical database reports can be significantly reduced . Automated Data Retrieval I-Bridge executes in the background giving the user full access to the application while data is being retrieved. I- Bridge simultaneously retrieves data from different sources through a single communications driver. I-Bridge eliminates having to get multiple database specific communications drivers to coexist on the same PC in order to consolidate data from different sources. I-Bridge Technical Background I-Bridge is a family of software products that allow users of Windows applications to gain quick, easy, safe access to databases, programs, and files on UNIX servers. It provides a single interface and communications driver for Windows applications to access these UNIX services. Information goes directly into spreadsheets and other popular applications; users do not need to manually locate, transfer and convert data. At the same time, I-Bridge allows information systems staff to protect these critical UNIX enterprise services. Agents Automate Data Retrieval I-Bridge Agents(TM) are used to fetch and deposit data using a set of properties such as account, password, source path, data retrieval commands, destination location within the Windows application, and completion trigger commands. The properties for I-Bridge Agents can be maintained and distributed by the IS staff, entered interactively, or set via function calls in the application's macro language. Fetch sends the retrieval commands to the UNIX I-Bridge along with a specification of the data format desired. The UNIX I-Bridge gets the data from the specified source, converts it and sends it back to the Windows I-Bridge. Deposit not only puts the data in the indicated location, such as a cell in a spreadsheet or position within a document, it also can trigger application programs such as macros to notify the user or continue to the next processing step. I-Bridge Agents execute in the background giving the user full access to the application while data is being retrieved. Multiple I-Bridge Agents can simultaneously retrieve data from different sources. Access To Information Not In Databases A large percentage of enterprise data is not in relational databases, but is output by purchased or internally developed COBOL and Fortran programs. I-Bridge provides access to these programs through the I-Bridge Command Adapter(TM) that allows Windows applications to invoke UNIX shell command scripts. Both the Bourne and "C" shell are supported. These shell scripts then execute the programs, converting and re-directing the output over the network via the I-Bridge to the Windows application. Intermediate file storage on the UNIX server can be eliminated. Users get easy access to programs and data without having to become experts at running them, and transferring and converting the resulting data. When stored on the server and shared, the shell scripts become the equivalent of easily maintained stored procedures for accessing programs and files. Consolidate Data From Multiple Sources In many organizations, different departments have their own databases and IS staffs. I-Bridge can access these different data sources simultaneously with a single network interface. This eliminates the problems involved in making multiple, database-specific communications products run on the same PC. Each department makes available SQL, stored procedures, and shell scripts to access their data and programs, so that users can easily access and consolidate data as needed with the I-Bridge. I-Bridge Advantages Over Query Generators Ad hoc query generators typically require the user to learn a new query tool, to know how the database is structured, and to interpret the cryptic names for tables and columns. These SQL access products generate SQL that may not be optimized. It may be further compromised by translation through ODBC. Many query generators also allow users to generate queries that may be costly and disruptive to database operations and performance. For these reasons, they are rarely used with production databases. Instead they are used with an expensive to maintain, duplicate database used just for queries. In contrast, I-Bridge is a production extraction tool that lets users get data using stored procedures, verified and optimized SQL, and shell command scripts prepared by the information system staff. I-Bridge provides them to users either through an application's macro language where they can be represented by buttons, or they can be selected from lists in the I-Bridge Wizard, an interactive tool for selecting workplans for I-Bridge Agents. Unlike a query generator, which receives requested data in its own application buffer, I-Bridge puts the information directly into the user's application---a spreadsheet, for example. No manual transfer or conversion of the data is necessary. This also avoids the 64 KB limit of Windows DDE. With the data in a Windows application, the user is free to delete unwanted columns, add new computed ones, change font styles and sizes, add graphs, and do other operations that are easy in the application, but difficult in SQL or a report writer language. I-Bridge is ideal for replacing regularly printed reports with on-demand reports that can be sent directly to user spreadsheets and word processors. IS Staff Retains Control And Saves Time I-Bridge lets the IS staff protect databases and other data sources from inefficient and performance degrading access methods. I-Bridge divides the database reporting task into two parts: the IS staff is responsible only for construction of the query, while the user controls the format of the report using a familiar Windows spreadsheet or word processing application. Since up to 80% of report requests involve only format changes, I-Bridge eliminates most report requests. Seamless Inter-operability Goal I-Kinetics' longer term goal is to make I-Bridge a seamless, plug and play communications framework for application and database inter-operability among several operating systems and hardware platforms. Steps toward this goal include providing UNIX access for Microsoft's OLE (Object Linking and Embedding) technology and providing API's using I-Kinetics' ObjectExpress dynamic integration technology for user developed applications. Once a service or application is interfaced to the I-Bridge, all other I- Bridge components automatically have access to it. Because I-Bridge has both server and client components connected with dynamic data type technology, it will be able to support new capabilities, such as object oriented databases, object extensions to relational databases, replicated servers, multi-media, and intelligent agents. I-Kinetics was formed in 1991 to develop high performance distributed computing products that integrate applications across multiple operating systems and frameworks. By making it easy for any application to communicate with another, the I-Bridge enables new services that automate and integrate business processes. It supports the shift from the common file oriented paradigm to the new client/server one. I- Bridge also extends the paradigm to include commercial applications and services other than databases. -------------------------------------------------------------------------------- 60.09.D Subject: Hughes NetLOCK - Software to Secure Network Communications From: Ball, Diana T <0007956@msgate.emis.hac.com> Org: HUGHES AIRCRAFT COMPANY Address: Public Relations Department, Systems Sector, PO Box 3310 Fullerton, Calif. 92634 Phone: (714) 732-5352 Phone: (714) 732-1637 Fax: (714) 732-0822 HUGHES INTRODUCES NetLOCK SOFTWARE TO SECURE NETWORK COMMUNICATIONS FULLERTON, Calif., Nov. 8 -- A software-based security product that ensures the privacy of computer data communications traveling across local and wide area networks was introduced today by Hughes Aircraft Company. The product, called NetLOCK, draws upon the technology and experience Hughes has gained in building defense systems. NetLOCK will be available in December 1993 for Sun Microsystems networks and Hughes will provide NetLOCK for Novell networks in 1994. "The proliferation of local and wide-area networks and distributed systems has exposed many corporations' vital information to unwanted eavesdroppers," said John Garber, the Hughes Information Security Products manager. "NetLOCK lets corporations and individuals take advantage of the communications power of public networks with the assurance that their data is protected from intruders. "NetLOCK provides security transparently, so users simply work and share data as they always have with the knowledge that NetLOCK is maintaining a secure communications channel." NetLOCK also ensures data integrity, so communications arrive intact and unaltered. Transmissions are placed in a cryptographic envelope and sent across the network with non-sensitive address information on the outside. During encryption, NetLOCK uses a number of error-checking technologies to ensure accurate data transmission. While a snooper could potentially see the envelope as it moves on the network, only the intended recipient can decrypt the file and read the data. NetLOCK can be installed on laptop computers permitting users to make and complete private communications transactions via dial-up or remote network connections. Data security and access control are accomplished through the use of confidential keys and certificates shared between the two communicating workstations. At the initiation of contact, workstations securely negotiate an encryption key and then verify the identity of each other. Only the workstations with the shared key and certificate can access the data, so as a user you know where your files are going. NetLOCK can manage an unlimited number of shared keys, enabling it to provide flexible security for small-scale and large-scale implementations. "This technique of automatic key management eliminates the biggest headache in using encryption," Garber said. "It also enables remote addition of new NetLOCK users quickly and simplifies the management of network security." NetLOCK is the result of more than a decade of research by Hughes Aircraft Company. Originally contracted by the Department of Defense to investigate protocols for secured computer networks, Hughes was asked to incorporate cryptographically security within the open system interconnection (OSI) communication reference model. This resulted in the generation of specifications and the establishment of a network communication architecture which protected both classified and unclassified networks. NetLOCK is the first in a family of products designed to provide effective, economical security for business and personal communications. NetLOCK will be made available for additional network systems during 1994. Available December 1, NetLOCK for Sun networks will retail for $3,995 for a 10-user site license. Hughes is also offering NetLOCK at an introductory price of $2,995 for those orders received prior to January 31, 1994. Currently, NetLOCK is only available for sale in the United States. ********************************************************************** For information about SunFlash send mail to info-sunflash@Sun.COM. Subscription requests should be sent to sunflash-request@Sun.COM. Archives are on draco.nova.edu, ftp.uu.net, sunsite.unc.edu, src.doc.ic.ac.uk and ftp.adelaide.edu.au For last month's digest, send email to flashadm@sun.com with a Subject line of 59.00 For Gopher and WAIS access: sunsite.unc.edu. (Login as 'gopher' for a simple gopher client, 'swais' for a simple WAIS client (over 500 databases). All prices, availability, and other statements relating to Sun or third party products are valid in the U.S. only. Please contact your local Sales Representative for details of pricing and product availability in your region. Descriptions of, or references to products or publications within SunFlash does not imply an endorsement of that product or publication by Sun Microsystems. Send brief articles (e.g. third party announcements) and include contact information (non-800#, fax #, email, etc) to: John McLaughlin, SunFlash editor, flash@Sun.COM. +1 305 351 4909