Wednesday, August 17, 2005

IBM Releases Open Analytics Interface


___________________________________________________________
Computerworld Data Management
August 17, 2005
___________________________________________________________

***************SPONSOR**************************************

FREE Download: CACHE post-relational database.

Get robust objects & robust SQL. CACHE, the post-relational database
from InterSystems, seamlessly combines object and relational
technologies -- without mapping! CACHE provides lightning fast speed,
massive scalability, robust reliability, and low cost of ownership to
professional application developers around the world.

Download your FREE copy at:
http://www.computerworld.com/ads/go2/19215910.html

************************************************************

In this issue:

* IBM Releases Open Analytics Interface
* Analytical CRM Gaining Gravity Globally
* IT Uses Web Services To Preserve Data
* EMC Announces Surveillance Management Application
* Toyota Distributor Turns To WhereNet For Vehicle Tracking
* U.S. Army Wraps Up Testing Of New Sensor System

Computerworld Blogs:

* Audio watermarking
* Stealing customer lists on the way out the door
* Right to privacy (protection)?
* App outsourcing and DBMS2

Other Resources:

IDC White Paper: Oracle Builds A Comprehensive SOA Platform
http://www.accelacomm.com/jlp/cwnl/11/10004081/

____________________________________________________________

IBM Releases Open Analytics Interface

IBM unveiled open-source technology designed to allow
companies to apply analytics to call center logs, warranty claims,
technician notes and other unstructured data sources.

http://www.computerworld.com/newsletter/0,4902,103913,00.html?nlid=DM

____________________________________________________________

Analytical CRM Gaining Gravity Globally

A report by an independent market analyst finds that analytical
customer relationship management technology, considered the logical
evolution of the CRM life cycle, is being adopted by enterprises on a
broader global scale.

http://www.computerworld.com/newsletter/0,4902,103808,00.html?nlid=DM

____________________________________________________________

IT Uses Web Services To Preserve Data

Companies are turning to Web services to maintain investments in
mainframes and other legacy systems. The new systems are unlocking data
on the host systems for use in new Web-based applications.

http://www.computerworld.com/newsletter/0,4902,103910,00.html?nlid=DM

***************SPONSOR**************************************

Keeping the Customer in View
How well do you know your customers?

Accurate customer data directly impacts loyalty and business planning,
yet few companies update data regularly. Experts address the challenges
of ensuring a consistent, coherent customer view across the
enterprise.

http://www.accelacomm.com/jlp/cwnlfillers/11/10003726/

************************************************************

EMC Announces Surveillance Management Application

EMC unveiled its Surveillance Analysis and Management
Solution, which provides hardware, software and professional services
for companies that need a comprehensive system to utilize and analyze
surveillance data.

http://www.computerworld.com/newsletter/0,4902,103813,00.html?nlid=DM

____________________________________________________________

Toyota Distributor Turns To WhereNet For Vehicle Tracking

A distributor for 145 Toyota dealers is using an active RFID tracking
system from WhereNet Corp. to locate and process more than 190,000
vehicles annually.

http://www.computerworld.com/newsletter/0,4902,103902,00.html?nlid=DM

____________________________________________________________

U.S. Army Wraps Up Testing Of New Sensor System

The U.S. Army has finished testing a sensor system in military vehicles
designed to help identify and diagnose mechanical issues in real time.

http://www.computerworld.com/newsletter/0,4902,103824,00.html?nlid=DM

***************SPONSOR**************************************

Business Intelligence Executive Briefing

Most companies are planning big investments in business intelligence --
so why not learn the best practices and avoid the common mistakes?
Computerworld's Executive Briefing, "Get Smart About Business
Intelligence," tells how to distribute BI "to the masses" and make sure
the underlying data is solid and secure. Download the free report,
compliments of Sybase.

http://www.accelacomm.com/jlp/cwfiller/11/10004322/

************************************************************

COMPUTERWORLD BLOGS
-----------------------------------

Audio watermarking

It's understandable that some of the most interesting stuff in the world happens
in research centers. They have the time and money to spend developing, testing
and playing with new solutions. One of the sites I keep my eyes on is the
Microsoft Research site which has come up with some wonderful stuff in the 12
months that I've been watching

http://www.computerworld.com/blogs/node/790?NLT_DM

____________________________________________________________

Stealing customer lists on the way out the door

Executive-search firm Korn/Ferry International is suing five former employees --
including a "technology coordinator" -- claiming they downloaded thousands of
prospect records from the firm's proprietary database of job candidates. The
defendants are starting their own breakaway business.

http://www.computerworld.com/blogs/node/782?NLT_DM

____________________________________________________________

Right to privacy (protection)?

Douglas Schweitzer posts about the constitutional right to privacy in the United
States. While I agree with his general direction, I also think that the
crucial conversations about "privacy" would be a lot more useful if people
(including judges) were more careful about their terms.

http://www.computerworld.com/blogs/node/775?NLT_DM

____________________________________________________________

App outsourcing and DBMS2

Don Tennant made a passionate case in his column last week that application
outsourcing is a major part of the future IT landscape. I agree.

http://www.computerworld.com/blogs/node/765?NLT_DM

___________@COMPUTERWORLD.COM___________________________

THE SECURITY AGENDA
-------------------
Build a security plan to protect your company's assets. In this
comprehensive report you will learn everything from how to educate
staff against picking easy-to-crack passwords or falling for "social
engineering" attacks to keeping up with the latest patches and fixes
from vendors. This report is a must for security professionals.
https://store.computerworld.com/?source=DM_bot

___________CONTACTS/SUBSCRIPTIONS___________________________

FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our online
customer service group at online@computerworld.com. Please include the
following subscriber e-mail address in all correspondence:

pet.computter@GMAIL.COM

ADVERTISING
-----------
For information on advertising, contact
Kathy_Snow@computerworld.com

PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://www.computerworld.com/utilities/privacy

SUBSCRIPTION SERVICES
---------------------
To sign up for Computerworld's e-mail newsletters, stop
getting them or change your e-mail address, go to the following URL:

http://www.cwrld.com/nl/preferences.asp?e=pet.computter@GMAIL.COM

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Copyright 2005 Computerworld Inc.
1 Speen Street
Framingham MA 01701