Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
January 30, 2007
1 Min Read
JasperSoft, a maker of open-source business intelligence tools, on Tuesday unveiled software for extracting data from multiple sources and loading it into a BI data warehouse.
JasperETL, which stands for extract, transform and load, was developed with Talend, a provider of open-source data integration tools. The new product adds data management capabilities to the JasperSoft BI Suite, which includes server software, analytics and reporting. ETL tools are used to extract data from multiple sources, transform it into a format to meet business needs, and then load it into a data warehouse. Key components and features of the JasperETL include a job designer that provides a graphical editor and functional view of the ETL process, and a transformation mapper that provides a view of data mappings and transformations. In addition, the tool provides real-time debugging throughout the transformation process, and a business modeler that provides a non-technical graphical view of the business information workflow. Metadata configuration wizards are also available to configure heterogeneous data sources and complex file formats, including positional, delimited, CSV, RegExp, XML, and LDIF data. The open-source edition of JasperETL is available immediately for free download and use under the GPL license through the JasperForge.org community Web site. A professional version is scheduled to ship in the spring, and is scheduled to include a shared metadata repository that enables team development of data integration projects. Technical support and professional services are available for both editions.
You May Also Like
*Why DDI? Why it is Important to Integrate DNS, DHCP, and IP Address Management in Your Network
Hybrid Mesh Firewall: An Essential Solution for Today's Distributed Enterprise
High Performance Applications with Dominion KX III
IT Service Management Vendor Rankings & Quadrant
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend