Wednesday, August 31, 2005

Fishing In The Data Pool


___________________________________________________________
Computerworld Data Management
August 31, 2005
___________________________________________________________

***************SPONSOR**************************************

On Sept. 14, BI changes forever. See it happen, live. You're invited to
the worldwide launch of Cognos 8 Business Intelligence. This is the BI
that IT has been wishing for. This is the BI that will change the way
business users make decisions. This is the BI only Cognos can deliver.
Reserve your front row seat. Register today at:

http://www.computerworld.com/ads/go2/19993598.html

************************************************************

In this issue:

* Fishing In The Data Pool
* New GoldenGate Tool Finds Database Discrepancies
* Brief: DOJ Deploys Software To Track Crime Data
* Network Effect
* Upcoming IBM Software Continually Backs Up Files

Computerworld Blogs:

* "Application Development Without Programmers"
* Yes, I definitely need to be clearer
* A classic enterprise technology bellwether
* Email is part of your project data

Other Resources:

IDC White Paper: Oracle Builds A Comprehensive SOA Platform
http://www.accelacomm.com/jlp/cwnl/11/10004081/

____________________________________________________________

Fishing In The Data Pool

Who's Who in IT: Systems and programming manager Shawn Mahoney talks
about his job at Foremost Insurance.

http://www.computerworld.com/newsletter/0,4902,104143,00.html?nlid=DM

____________________________________________________________

New GoldenGate Tool Finds Database Discrepancies

GoldenGate Software announced a tool designed to root out
discrepancies between databases while they're still in use.

http://www.computerworld.com/newsletter/0,4902,104247,00.html?nlid=DM

____________________________________________________________

Brief: DOJ Deploys Software To Track Crime Data

The Bureau of Justice Statistics is using predictive analysis software
from SPSS to analyze crime data and produce reports on a number of
justice-related topics.

http://www.computerworld.com/newsletter/0,4902,104241,00.html?nlid=DM

***************SPONSOR**************************************

COMMVAULT -- FREE WEBEX
SMART SWITCH: TO COMMVAULT BACKUP & RECOVERY SOFTWARE

Backup problems getting you down? Tired of chasing admin problems?
Using several backup products across your enterprise? Join the
bandwagon -- make the Smart Switch to CommVault Galaxy backup and
recovery software. Faster restores, one unified view of heterogeneous
environment, seamless transition from SMB to enterprise software. Same
product, same GUI, same technology, reduced costs. Attend free
WebEx.

http://www.computerworld.com/ads/go2/19944433.html

************************************************************

Network Effect

Frankly Speaking: Many rural and small hospitals won't be able to adopt
electronic health records (EHR), readers tell Frank Hayes. And that
could undermine the benefit to those health care centers that do
embrace EHR.

http://www.computerworld.com/newsletter/0,4902,104195,00.html?nlid=DM

____________________________________________________________

Upcoming IBM Software Continually Backs Up Files

IBM plans to release new software on Sept. 16 for backing up files
automatically on laptops and desktop PCs.

http://www.computerworld.com/newsletter/0,4902,104238,00.html?nlid=DM

***************SPONSOR**************************************

The Wireless Corporation

Here's what you need to know before you take your company wireless.
This report covers key technology and management issues, from syncing
BlackBerries for the sales staff to building sophisticated inventory
control systems. Get this Computerworld report free (a $195 value) for
a limited time.

http://www.accelacomm.com/jlp/cwfiller/0/10003248/

************************************************************

COMPUTERWORLD BLOGS
-----------------------------------

"Application Development Without Programmers"

"Application Development Without Programmers," by James Martin, popularized the
myth of app dev tools that would (almost) eliminate the need for actual coding,
and perhaps even be usable by non-programmers. At various times the proposed
panacea has been procedural "fourth generation languages", nonprocedural 4GLs,
I-CASE (Integrated Computer-Aided Software Engineering) products, ...

http://www.computerworld.com/blogs/node/886?NLT_DM

____________________________________________________________

Yes, I definitely need to be clearer

John Parker said he agrees with the direction of the DBMS2 proposal, but has
several major nits to pick. (August 15 -- I don't see any separate links for
individual entries.) But the thing is, I think we agree more than not, even in
the areas where he thinks we don't see eye to eye. Obviously, I need to be
clearer.

http://www.computerworld.com/blogs/node/885?NLT_DM

____________________________________________________________

A classic enterprise technology bellwether

One of the flagship apps for text mining has been IBM's work (primarily with
Clearforest, I think), in the area of automobile warranty claim analysis. In the
most recent iteration, it's the spearhead app for UIMA. Actually,
maintenance/diagnosis/quality/customer service is often an area where new
technology ...

http://www.computerworld.com/blogs/node/875?NLT_DM

____________________________________________________________

Email is part of your project data

There's been a lot of talk on the blogs recently about retaining email. I agree
with Curt's comment that we should be keeping email for the simple reason of
text and data mining. I also think we're forgetting that email is now the main
method of communication for a large number of organizations and groups.

http://www.computerworld.com/blogs/node/872?NLT_DM

___________@COMPUTERWORLD.COM___________________________

THE SECURITY AGENDA
-------------------
Build a security plan to protect your company's assets. In this
comprehensive report you will learn everything from how to educate
staff against picking easy-to-crack passwords or falling for "social
engineering" attacks to keeping up with the latest patches and fixes
from vendors. This report is a must for security professionals.
https://store.computerworld.com/?source=DM_bot

___________CONTACTS/SUBSCRIPTIONS___________________________

FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our online
customer service group at online@computerworld.com. Please include the
following subscriber e-mail address in all correspondence:

pet.computter@GMAIL.COM

ADVERTISING
-----------
For information on advertising, contact
Kathy_Snow@computerworld.com

PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://www.computerworld.com/utilities/privacy

SUBSCRIPTION SERVICES
---------------------
To sign up for Computerworld's e-mail newsletters, stop
getting them or change your e-mail address, go to the following URL:

http://www.cwrld.com/nl/preferences.asp?e=pet.computter@GMAIL.COM

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Copyright 2005 Computerworld Inc.
1 Speen Street
Framingham MA 01701