News Stay informed about the latest enterprise technology news and product updates.

Entering the Beehive - be careful you don't get stung!

thumb_white.gifOracle are at it again, over a number of years they have tried to become a ‘player’ in the messaging / collaboration market. Yesterday they announced Beehive, their latest attempt to get a piece of this sweet, sweet market.

Gartner has struck a cautious note with reference to previous attempts that have come and gone from Oracle. However the references to the success of Microsoft’s Sharepoint underlines the effect that product is having amongst competitor companies. 
Information Week emphasises the important role security will have as part of the Beehive offering, something all of the commercial collaborative community fully understands. The ability to make inroads into this community will need Oracle to show long term commitment and innovation that others are not already delivering or about to deliver.
Good luck Beehive, however its not going to be easy.
Thanks to Glenn for bringing my attention to Beehive.
The opinions expressed herein are my own personal opinions and do not represent my employer’s view in anyway. All postings and code samples are provided ‘AS IS’ with no warranties, and confers no rights.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

So then does Oracle own the Beehive name for the collaboration tools or IBM since they use this name internally
Cancel
Internal use is no use if not trade marked / copyrighted. Could be fun though!
Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close