Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".
heaven42: July 2008

Wednesday, July 30, 2008

Custom software

Custom software (also known as Bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available software (also called off-the-shelf or COTSsoftware). It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Custom software is also when companies or governments pay for customized software for budget or project managing.

Examples of bespoke software include ATMs and Supermarket checkout scanners. Other examples include many web sites and web-based applications.

However, according to the US government, million and multi-million dollar projects for custom software are available to bid on. (Refer to www.ccr.gov for more information.) Multiple companies with security clearances are able to bid for these massive projects. Other companies will successfully bid on these projects and then sell the project to another company for profit.

Wednesday, July 23, 2008

Data quality

1. Data Quality refers to the degree of excellence exhibited by the data in relation to the portrayal of the actual phenomena. GIS Glossary

2. The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use. Government of British Columbia

3. The totality of features and characteristics of data that bears on their ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data

Wednesday, July 16, 2008

Customer Data Integration

Customer Data Integration (CDI) is the combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises typically where there are multiple sources of associated data in multiple application systems and databases.

What does that really mean? When you ask the average Joe or Jane on the street “What is customer data?” they usually answer "Name and address...maybe social security number?"

However, customer data is much more complex; for example, the number of fields that represent just a name can be anywhere from six to twelve or more (e.g., first name, last name, middle name, initials, nickname, maiden name, married name, professional title, academic title and suffix.) The address entries are almost as complex (e.g., primary address number, pre-directional (N, S, E, W,) street name, street suffix, post-directional, secondary identifier (building, suite, apt,) secondary number, city, state, ZIP, and ZIP+4(R))

Thursday, July 10, 2008

Nested transaction

With reference to a database transaction, a nested transaction occurs when a new transaction is started by an instruction that is already inside an existing transaction. The new transaction is said to be nested within the existing transaction, hence the term.

Changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. This follows from the isolation property of transactions.

The capability to handle nested transactions properly is a prerequisite for true component based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases.

Wednesday, July 02, 2008

Gathering of addresses

In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Sometimes, if the sent spam is "bounced" or sent back to the sender by various programs that eliminate spam, or if the recipient clicks on an unsubscribe link, that may cause that email address to be marked as "valid", which is interpreted by the spammer as "send me more".