Software

April 1996

INFORMATION TECHNOLOGY GUIDE

Software

New 64-bit processing spurs data-warehousing applications.

Bitter competition in the software market prompted a flurry of acquisitions over the last year. The biggest deal was IBM's purchase of Lotus for $3.5 billion, followed by Computer Associates' $1.8 billion offer for Legent. In addition, Informix bought Illustra Information Technologies, Symantec picked up Delrina and Corel is on the verge of obtaining Novell's beleaguered WordPerfect.

Market consolidation should bode well for federal buyers this year as companies unload feature-packed programs for bargain prices. As more data centers close as a result of a recent directive from the Office of Management and Budget, agencies will be reengineering their information systems and turning attention to client-server tools.

Integrated enterprise software will help agencies discard dozens of legacy hardware systems and migrate to single sets of programs capable of handling everything from finance and personnel applications to procurement and logistics. The advantage of this approach is that data is in the same format, regardless of where it resides.

Data Warehousing. The hottest software category is data warehousing, in which programs pull strategic information from disparate databases and place it into centralized repositories. Tools are becoming available to help agencies mine and manipulate data from repositories. These products range from simple data-access programs from companies such as Brio and Cognos to multidimensional systems from Oracle or SAS Institute that can handle complex queries.

Specialized tools recognize hidden patterns in databases and help link occurrences to specific events. They also can be used to estimate the future value of variables.

Data-mining products from companies such as Information Discovery and Cross Z International help extract data while Prism Solutions and Vality Technology offer tools for scrubbing data. Software AG's SourcePoint pulls data out of relational and mainframe databases and transfers it to warehouses.

Relational on-line analytical processing systems from companies such as Information Advantage, MicroStrategy and Prodea add lightning-fast decision support capabilities to relational databases. They eliminate the need for agencies to build separate data warehouses.

DBMS. New 64-bit data processing capabilities have spurred more data warehousing applications because computers now have more memory to store information contained in huge repositories. Makers of database management systems (DBMS) are eagerly embracing 64-bit technology for its ability to handle powerful applications.

Oracle, which recently bought data warehousing products from Information Resources, has become the first DBMS vendor to provide VLM (very large memory) technology for Unix-based 64-bit computer systems. VLM enables a larger portion of the database to reside in memory so that more users can access critical data faster, with less time spent moving data from disks.

Sybase is expected to introduce 64-bit DBMS applications later this year. Other companies, meanwhile, are focusing on support for Internet applications involving complex data such as hypertext markup language and three-dimensional graphics. Informix is in the process of integrating Illustra's object-oriented DBMS software with its own database management system to create Universal Server software that will handle multimedia, spatial data and other complex imagery.

As organizations migrate to client-server networks, an increasing number of companies are offering workgroup database management systems, which replicate work throughout enterprises. Workgroup products from Computer Associates, IBM, Microsoft, Oracle and Sybase monitor systems and support servers.

Groupware. Makers of groupware-controller programs that integrate different types of software-will feel the heat this year from internal agency networks that use Internet technology to link workers and provide access to databases. These intranets, as they are known, enable many users to work on the same application at the same time. They are much less secure than groupware, but are significantly cheaper and easier to use.

Lotus Notes, the leader in groupware, is fighting back with a new version that features an improved user interface, better e-mail capabilities, enhanced Internet support and fresh application-development tools. Notes 4.0 can host 800 more users per server than the previous version and takes up less bandwidth per user. But it remains to be seen whether this bold introduction can stand up to the almighty Internet and its related technology.

Suites. Heavy discounting will continue in the software-suites sector as that market reaches the saturation point. But although prices are dropping, programs are becoming more sophisticated. Lotus is offering its NotesSuite package, which integrates with the company's groupware. And Novell's PerfectOffice Professional 3.0 for Windows integrates with the company's popular network operating system.

Several enhancements can be found on Microsoft's Office 95 and Office Professional 4.3 for Windows. As agencies upgrade their operating systems and migrate to enterprise infrastructures, more are expected to turn to the company's BackOffice-a suite of server applications for Windows NT that includes a database, messaging software, mainframe gateway and systems-management program.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.