Wednesday, August 31, 2005

Fishing In The Data Pool

Computerworld Data Management
August 31, 2005


On Sept. 14, BI changes forever. See it happen, live. You're invited to
the worldwide launch of Cognos 8 Business Intelligence. This is the BI
that IT has been wishing for. This is the BI that will change the way
business users make decisions. This is the BI only Cognos can deliver.
Reserve your front row seat. Register today at:


In this issue:

* Fishing In The Data Pool
* New GoldenGate Tool Finds Database Discrepancies
* Brief: DOJ Deploys Software To Track Crime Data
* Network Effect
* Upcoming IBM Software Continually Backs Up Files

Computerworld Blogs:

* "Application Development Without Programmers"
* Yes, I definitely need to be clearer
* A classic enterprise technology bellwether
* Email is part of your project data

Other Resources:

IDC White Paper: Oracle Builds A Comprehensive SOA Platform


Fishing In The Data Pool

Who's Who in IT: Systems and programming manager Shawn Mahoney talks
about his job at Foremost Insurance.,4902,104143,00.html?nlid=DM


New GoldenGate Tool Finds Database Discrepancies

GoldenGate Software announced a tool designed to root out
discrepancies between databases while they're still in use.,4902,104247,00.html?nlid=DM


Brief: DOJ Deploys Software To Track Crime Data

The Bureau of Justice Statistics is using predictive analysis software
from SPSS to analyze crime data and produce reports on a number of
justice-related topics.,4902,104241,00.html?nlid=DM



Backup problems getting you down? Tired of chasing admin problems?
Using several backup products across your enterprise? Join the
bandwagon -- make the Smart Switch to CommVault Galaxy backup and
recovery software. Faster restores, one unified view of heterogeneous
environment, seamless transition from SMB to enterprise software. Same
product, same GUI, same technology, reduced costs. Attend free


Network Effect

Frankly Speaking: Many rural and small hospitals won't be able to adopt
electronic health records (EHR), readers tell Frank Hayes. And that
could undermine the benefit to those health care centers that do
embrace EHR.,4902,104195,00.html?nlid=DM


Upcoming IBM Software Continually Backs Up Files

IBM plans to release new software on Sept. 16 for backing up files
automatically on laptops and desktop PCs.,4902,104238,00.html?nlid=DM


The Wireless Corporation

Here's what you need to know before you take your company wireless.
This report covers key technology and management issues, from syncing
BlackBerries for the sales staff to building sophisticated inventory
control systems. Get this Computerworld report free (a $195 value) for
a limited time.



"Application Development Without Programmers"

"Application Development Without Programmers," by James Martin, popularized the
myth of app dev tools that would (almost) eliminate the need for actual coding,
and perhaps even be usable by non-programmers. At various times the proposed
panacea has been procedural "fourth generation languages", nonprocedural 4GLs,
I-CASE (Integrated Computer-Aided Software Engineering) products, ...


Yes, I definitely need to be clearer

John Parker said he agrees with the direction of the DBMS2 proposal, but has
several major nits to pick. (August 15 -- I don't see any separate links for
individual entries.) But the thing is, I think we agree more than not, even in
the areas where he thinks we don't see eye to eye. Obviously, I need to be


A classic enterprise technology bellwether

One of the flagship apps for text mining has been IBM's work (primarily with
Clearforest, I think), in the area of automobile warranty claim analysis. In the
most recent iteration, it's the spearhead app for UIMA. Actually,
maintenance/diagnosis/quality/customer service is often an area where new
technology ...


Email is part of your project data

There's been a lot of talk on the blogs recently about retaining email. I agree
with Curt's comment that we should be keeping email for the simple reason of
text and data mining. I also think we're forgetting that email is now the main
method of communication for a large number of organizations and groups.


Build a security plan to protect your company's assets. In this
comprehensive report you will learn everything from how to educate
staff against picking easy-to-crack passwords or falling for "social
engineering" attacks to keeping up with the latest patches and fixes
from vendors. This report is a must for security professionals.


To submit feedback about Computerworld's e-mails, contact our online
customer service group at Please include the
following subscriber e-mail address in all correspondence:


For information on advertising, contact

Computerworld's online privacy policy is at:

To sign up for Computerworld's e-mail newsletters, stop
getting them or change your e-mail address, go to the following URL:

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Copyright 2005 Computerworld Inc.
1 Speen Street
Framingham MA 01701