September 2002
Financial Executive;Sep2002, Vol. 18 Issue 6, p15
Academic Journal
This article reports on the release of DataCheck, a data management system from SGP International Inc., a developer of custom designed data management solutions. DataCheck uses eXtensible Markup Language that allows users to reconcile data among an unlimited number of projects. It uses simple English language commands to run a variety of data queries.


Related Articles

  • A NOVEL SECURITY MECHANISM FOR HYBRID ENCRYPTION IN MINERAL MANAGEMENT INFORMATION SYSTEM. Tingyao Jiang; Heng Yu; Lele Cui // Intelligent Automation & Soft Computing;Sep2011, Vol. 17 Issue 6, p665 

    To increase the tax collection of mineral resources and enhance the management of resource exploitation, computerized mineral management information systems (MMIS) are developed and applied to the government management system. The MMIS are run at checking portals that inspect trucks transporting...

  • Saving the data. Preimesberger, Chris // eWeek;11/27/2006, Vol. 23 Issue 47, p11 

    The article talks about the new federal rules which will be going into effect on December 1, 2006, concerning the business handling on electronically stored information in businesses in the U.S. These new regulations were part of the spate of amended federal court rules which had been issued by...

  • Partnership with IBM Drive Data Management Solutions. King, Elliot // Database Trends & Applications;May2007, Vol. 21 Issue 5, p20 

    The article presents the IBM PartnerWorld to provide database and middleware tools to application developers. The strategy drives the broad range of information technologies into the marketplace by IBM. Sales and marketing support for partners and worldwide consulting services are also the focus...

  • How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Compagna, Luca; El Khoury, Paul; Krausová, Alžběta; Massacci, Fabio; Zannone, Nicola // Artificial Intelligence & Law;Jan2009, Vol. 17 Issue 1, p1 

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to...

  • 10 hidden perils of DR planning. Preston, W. Curtis // Storage Magazine;May2006 Supplement, Vol. 5, p8 

    The article discusses the top 10 reasons for disaster recovery (DR) plans to fall short of protecting a company's data. Since storage managers tend to focus on day-to-day issues, they give more attention to backups than DR. If a company has not yet developed a DR plan it can assign particular...

  • E-Mail Disclaimers and E-Mail Security. Coolidge, Daniel S. // GPSolo;Dec2008, Vol. 25 Issue 8, p9 

    The author explores the factors contributing to the growing concern over the safety and security of electronic mails among lawyers in the U.S. in 2008. He argues that most lawyers claim of the possibility that e-mails can conceivably be intercepted at various points along its route of...

  • Data centres enable sharing and research recognition. Ashley, Kevin // Research Information;Apr/May2014, Issue 59, p26 

    The article offers the author's view on the benefits of data centres. The author says that these centres help in spreading and reinforcing a culture of openness and data sharing among researchers, and provide ready access to large quantities of data. He adds that these centres make it easier for...

  • Could cloud be the new tape? Whitehouse, Lauren // Storage Magazine;Dec2010, Vol. 9 Issue 11, p6 

    The article discusses the April 2010 Enterprise Strategy Group (ESG) Research Report, Data Protection Market Trends. The survey revealed that 20 percent of ESG research respondents use tap for their on-site backup process while 80 percent of the companies have transitioned to a disk-assisted or...

  • Introducing 3DR. Duplessie, Steve // Storage Magazine;Jun2006, Vol. 5 Issue 4, p72 

    The article explains the concept of disk-to-disk-to-disaster recovery (3DR). 3DR is the construct to consider for protected data. The article continues to discuss how 3DR works to eliminate all the duplicates or back-ups companies usually store. It ends with the conclusion that the thought...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics