talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

3377

Collection of O'Reilly books on Data Engineering.

Filtering by: data-engineering ×

Sessions & talks

Showing 1626–1650 of 3377 · Newest first

Search within this event →
Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Message Queuing Telemetry Transport (MQTT) is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.

SAP ABAP: Hands-On Test Projects with Business Scenarios

" SAP ABAP (Advanced Business Application Programming) elucidates the numerous features of the core programming platform, which is used for development for the entire SAP software suite. SAP ABAP uses numerous hands on business oriented use cases and a valuable dedicated e-resource to demonstrate the underlying advanced concepts of the OO ABAP environment and the SAP UI. SAP ABAP covers the latest version (NetWeaver 7.3 and SAP application programming release 6.0) of the platform for demonstrating the customization and implementation phases of the SAP software implementation. Shorn of weighty theoretical treatment and preoccupation with language syntax, SAP ABAP is a comprehensive, practical one stop solution,which demonstrates and conveys the language’s commands and features through hands on examples. The accompanying e-resource is a take off point to the book. SAP ABAP works in tandem with the accompanying e-resource to create an interactive learning environment where the book provides a brief description and an overview of a specified feature/command followed by the user switching over to the accompanying e-resource, where a step-by-step guide to creating and running the feature’s object is available. The presentation of the features is scenario oriented, i.e. most of the features are demonstrated in terms of small business scenarios. The e-resource contains the scenario descriptions, screen shots, detailed screen cams and ABAP program source to enable the reader to create all objects related to the scenario and run/execute them. The underlying concepts of a feature/command are conveyed through execution of these hands-on programs. Further exercises to be performed independently by the reader are also proposed. The demonstration/illustration objects including the programs rely on some of the SAP application tables being populated, for example an IDES system which is now a de facto system for all SAP training related activities. "

IBM Linear Tape File System Enterprise Edition V1.1.1.1 Installation and Configuration Guide

This IBM® Redbooks® publication helps you with planning, installation, and configuration of the new IBM Linear Tape File System™ (LTFS) Enterprise Edition (EE) V1.1.1.1 for the IBM System Storage® TS3500 and TS4500 Tape Libraries. LTFS EE is designed to enable the use of LTFS for the policy management of tape as a storage tier in an IBM General Parallel File System (IBM GPFS™)-based environment and helps encourage the use of tape as a critical tier in the storage environment. LTFS EE can run any application that is designed for disk files on tape. LTFS EE supports IBM Linear Tape-Open (LTO) Ultrium 6 and 5 tape drives, and IBM System Storage TS1140 Tape Drives that are installed in TS3500 tape libraries. LTFS EE can play a major role in reducing the cost of storage for data that does not need the access performance of primary disk. The use of LTFS EE to replace disks with tape in Tier 2 and Tier 3 storage can improve data access over other storage solutions because it improves efficiency and streamlines management for files on tape. LTFS EE simplifies the use of tape by making it transparent to the user and manageable by the administrator under a single infrastructure. This publication is intended for anyone who wants to understand more about LTFS EE planning and implementation. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

Oracle Enterprise Manager 12c Command-Line Interface

Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targets Quickly create administrator accounts that are fully-configured with pre-expired passwords and all needed roles Invoke batch files to execute sequences of related commands with consistency against multiple targets Batch create large groups of user logins with a single command and more! The Enterprise Manager Command Line Interface (EM CLI) is the administrator's key to unlocking the power of Enterprise Manager 12c (EM12c) with scalability, repeatability, and confidence. In previous versions, most administrators ventured into the command-line interface only with the assistance of Oracle Support. But now there are many features in EM12c that are accessible only from the command-line. This is far from a disadvantage! Enterprise Manager is now a powerful tool for automation in the hands of a skilled database administrator. Enterprise Manager scripting offers potential for all administrators who manage Oracle’s enterprise-level products in their environment. You can automate from the smallest, single-instance configuration all the way up to a broadly distributed enterprise-level rollout having database instances strewn across broad geographical distributions. The power of the EM CLI returns the administrator to the golden age, where the entire environment, from database to application to infrastructure, can often be managed from this powerful command line tool secured by the robust Enterprise Manager framework. Brings a golden-age of automation to Oracle Database administrators Provides ready-made scripts contributed by leading members of the community Covers advanced techniques involving Jython and Python

Search: How the Data Explosion Makes Us Smarter

Search is as old as language. We've always needed to find something in the jumble of human creation. The first web was nothing more than passing verbal histories down the generations so others could find and remember how not to get eaten; the first search used the power of written language to build simple indexes in printed books, leading to the Dewey Decimal system and reverse indices in more modern times. Then digital happened. Besides having profound societal impacts, it also made the act of searching almost impossibly complex for both engines and searchers. Information isn’t just words; it is pictures, videos, thoughts tagged with geocode data, routes, physical world data, and, increasingly, the machines themselves reporting their condition and listening to others’. Search: How the Data Explosion Makes Us Smarter, the first in the Insight Labs Library, holds up a mirror to our time to see if search can keep up. Author Stefan Weitz explores the idea of access to help readers understand how we are inventing new ways to search and access data through devices in more places and with more capabilities. We are at the cusp of imbuing our generation with superpowers, but only if we fundamentally rethink what search is, how people can use it, and what we should demand of it.

Data Fluency: Empowering Your Organization with Effective Data Communication

A dream come true for those looking to improve their data fluency Analytical data is a powerful tool for growing companies, but what good is it if it hides in the shadows? Bring your data to the forefront with effective visualization and communication approaches, and let Data Fluency: Empowering Your Organization with Effective Communication show you the best tools and strategies for getting the job done right. Learn the best practices of data presentation and the ways that reporting and dashboards can help organizations effectively gauge performance, identify areas for improvement, and communicate results. Topics covered in the book include data reporting and communication, audience and user needs, data presentation tools, layout and styling, and common design failures. Those responsible for analytics, reporting, or BI implementation will find a refreshing take on data and visualization in this resource, as will report, data visualization, and dashboard designers. Conquer the challenge of making valuable data approachable and easy to understand Develop unique skills required to shape data to the needs of different audiences Full color book links to bonus content at juiceanalytics.com Written by well-known and highly esteemed authors in the data presentation community Data Fluency: Empowering Your Organization with Effective Communication focuses on user experience, making reports approachable, and presenting data in a compelling, inspiring way. The book helps to dissolve the disconnect between your data and those who might use it and can help make an impact on the people who are most affected by data. Use Data Fluency today to develop the skills necessary to turn data into effective displays for decision-making.

Understanding Large Temporal Networks and Spatial Networks: Exploration, Pattern Searching, Visualization and Network Evolution

This book explores social mechanisms that drive network change and link them to computationally sound models of changing structure to detect patterns. This text identifies the social processes generating these networks and how networks have evolved.

IBM PowerHA SystemMirror for AIX Cookbook

This IBM® Redbooks® publication can help you install, tailor, and configure the new IBM PowerHA® Version 7.1.3, and understand new and improved features such as migrations, cluster administration, and advanced topics like configuring in a virtualized environment including workload partitions (WPARs). With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you. This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience. This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.

10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Donts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. Its a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Donts cant do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Donts employs personal anecdotes and major news stories to illustrate what canand all too often doeshappen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Donts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Dont. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Donts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you dont get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physicalin short, so that you dont trust anyone overanything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.

IBM TS4500 Tape Library Guide

The IBM® TS4500 tape library is a next-generation tape solution that delivers higher storage density and integrated management. This book covers the TS4500 product description, components, feature codes, specifications, supported tape drives, encryption, new integrated management console, and the command-line interface (CLI). This publication is intended for anyone who wants to understand more about the IBM TS4500 tape library. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

Building IBM Enterprise Content Management Solutions From End to End

IBM® Enterprise Content Management (ECM) solutions provide efficient and effective ways to capture content, manage the content and business processes, discover insights from the content, and derive actions to improve business processes, products, and services. This IBM Redbooks® publication introduces and highlights some of the IBM ECM products that can be implemented and integrated together to create end-to-end ECM solutions: IBM Case Manager IBM Datacap IBM Content Manager OnDemand IBM Enterprise Records IBM Watson™ Content Analytics IBM Content Classification Not all of the products are required to be integrated into an ECM solution. Depending on your business requirements, you can choose a subset of these products to be built into your ECM solutions. This book serves as a hands-on learning guide for information technology (IT) specialists who plan to build ECM solutions from end-to-end, for a proof of concept (PoC) environment, or for a proof of technology environment. For implementing a production-strength ECM solution, also refer to IBM Knowledge Center, IBM Redbooks publications, and IBM Software Services.

IBM Virtualization Engine TS7700 with R3.1

This IBM® Redbooks® publication highlights TS7700 Virtualization Engine Release 3.1. It is intended for system architects who want to integrate their storage systems for smoother operation. The IBM Virtualization Engine TS7700 offers a modular, scalable, and high-performing architecture for mainframe tape virtualization for the IBM System z® environment. It integrates 3592 Tape Drives, high-performance disks, and a new disk cache subsystem into a storage hierarchy. This storage hierarchy is managed by robust storage management firmware with extensive self-management capability. It includes the following advanced functions: Policy management to control physical volume pooling Cache management Redundant copies, including across a grid network Copy mode control The new IBM Virtualization Engine TS7700 Release 3.1 continues the next generation of TS7700 Virtualization Engine servers for System z tape: IBM Virtualization Engine TS7720 Server Model VEB with 3956-CS9 and 3-TB SAS drives with RAID 6 protection IBM Virtualization Engine TS7740 Server Model V07 with 3956-CC9 with 600-GB SAS drives with RAID 6 protection TS7700 Virtualization Engine Release 3.1 builds on the existing capabilities of the TS7700 family. It also introduces the following capabilities: 8-Gb IBM FICON® adapters for host attachment Up to eight FICON channel host attachments, doubling the previous number of channels available Up to 512 logical path definitions per FICON channel, doubling the previous number of logical paths per channel IBM FlashCopy® for disaster recovery testing Support for a second TS7720 expansion frame attached to a TS7720 system for a total TS7720 system capacity up to 1 PB before compression New Time Delayed Copy policy

IBM SAN Volume Controller 2145-DH8 Introduction and Implementation

Data is the new currency of business, the most critical asset of the modern organization. In fact, enterprises that can gain business insights from their data are twice as likely to outperform their competitors; yet, 72 percent of them have not started or are only planning big data activities. In addition, organizations often spend too much money and time managing where their data is stored. The average firm purchases 24% more storage every year, but uses less than half of the capacity it already has. A member of the IBM® Storwize® family, IBM SAN Volume Controller (SVC) Data Platform is a storage virtualization system that enables a single point of control for storage resources to help support improved business application availability and greater resource utilization. The objective is to manage storage resources in your IT infrastructure and to make sure they are used to the advantage of your business, and do it quickly, efficiently, and in real time, while avoiding increases in administrative costs. Virtualizing storage with SVC Data Platform helps make new and existing storage more effective. SVC Data Platform includes many functions traditionally deployed separately in disk systems. By including these in a virtualization system, SVC Data Platform standardizes functions across virtualized storage for greater flexibility and potentially lower costs. SVC Data Platform functions benefit all virtualized storage. For example, IBM Easy Tier® optimizes use of flash storage. And IBM Real-time Compression™ enhances efficiency even further by enabling the storage of up to five times as much active primary data in the same physical disk space. Finally, high-performance thin provisioning helps automate provisioning. These benefits can help extend the useful life of existing storage assets, reducing costs. Integrating these functions into SVC Data Platform also means that they are designed to operate smoothly together, reducing management effort. In this IBM Redbooks® publication, we discuss the latest features and functions of the SVC 2145-DH8 and software version 7.3, implementation, architectural improvements, and Easy Tier.

IBM Tivoli Storage Productivity Center V5.2 Release Guide

IBM® Tivoli® Storage Productivity Center V5.2 is a feature-rich storage management software suite. The integrated suite provides detailed monitoring, reporting, and management within a single console. In addition, implementing the IBM SmartCloud® Virtual Storage Center (VSC) license with Tivoli Storage Productivity Center addresses new workloads that require massive scale and rapid pace, and accelerates business insight, by adding advanced analytics functions such as storage optimization, provisioning, and transformation. This IBM Redbooks® publication is intended for storage administrators and users who are installing and using the features and functions in IBM Tivoli Storage Productivity Center V5.2. The information in this Redbooks publication can be used to plan for, install, and customize the components of Tivoli Storage Productivity Center in your storage infrastructure. Note: This IBM Redbooks publication is written and based on Tivoli Storage Productivity Center V5.2.2. Sections in this book that pertain to advanced analytics, including cloud configuration, provisioning, transforming volumes, and storage optimization all require the IBM SmartCloud Virtual Storage Center license to be installed.

Expert Oracle RAC Performance Diagnostics and Tuning

" Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at optimizing RAC databases by following a methodical approach based on scientific analysis rather than using a speculative approach, twisting and turning knobs and gambling on the system. The book starts with the basic concepts of tuning methodology, capacity planning, and architecture. Author Murali Vallath then dissects the various tiers of the testing implementation, including the operating system, the network, the application, the storage, the instance, the database, and the grid infrastructure. He also introduces tools for performance optimization and thoroughly covers each aspect of the tuning process, using many real-world examples, analyses, and solutions from the field that provide you with a solid, practical, and replicable approach to tuning a RAC environment. The book concludes with troubleshooting guidance and quick reference of all the scripts used in the book. Expert Oracle RAC Performance Diagnostics and Tuning covers scenarios and details never discussed before in any other performance tuning books. If you have a RAC database, this book is a requirement. Get your copy today. Takes you through optimizing the various tiers of the RAC environment. Provides real life case studies, analysis and solutions from the field. Maps a methodical approach to testing, tuning and diagnosing the cluster"

Architecting and Deploying DB2 with BLU Acceleration

IBM® DB2® with BLU Acceleration is a revolutionary technology that is delivered in DB2 for Linux, UNIX, and Windows Release 10.5. BLU Acceleration delivers breakthrough performance improvements for analytic queries by using dynamic in-memory columnar technologies. Different from other vendor solutions, BLU Acceleration allows the unified computing of OLTP and analytics data inside a single database, therefore, removing barriers and accelerating results for users. With observed hundredfold improvement in query response time, BLU Acceleration provides a simple, fast, and easy-to-use solution for the needs of today's organizations; quick access to business answers can be used to gain a competitive edge, lower costs, and more. This IBM Redbooks® publication introduces the concepts of DB2 with BLU Acceleration. It discusses the steps to move from a relational database to using BLU Acceleration, optimizing BLU usage, and deploying BLU into existing analytic solutions today, with an example of IBM Cognos®. This book also describes integration of DB2 with BLU Acceleration into SAP Business Warehouse (SAP BW) and SAP's near-line storage solution on DB2. This publication is intended to be helpful to a wide-ranging audience, including those readers who want to understand the technologies and those who have planning, deployment, and support responsibilities.

Evaluation Theory, Models, and Applications, 2nd Edition

The golden standard evaluation reference text Now in its second edition, Evaluation Theory, Models, and Applications is the vital text on evaluation models, perfect for classroom use as a textbook, and as a professional evaluation reference. The book begins with an overview of the evaluation field and program evaluation standards, and proceeds to cover the most widely used evaluation approaches. With new evaluation designs and the inclusion of the latest literature from the field, this Second Edition is an essential update for professionals and students who want to stay current. Understanding and choosing evaluation approaches is critical to many professions, and Evaluation Theory, Models, and Applications, Second Edition is the benchmark evaluation guide. Authors Daniel L. Stufflebeam and Chris L. S. Coryn, widely considered experts in the evaluation field, introduce and describe 23 program evaluation approaches, including, new to this edition, transformative evaluation, participatory evaluation, consumer feedback, and meta-analysis. Evaluation Theory, Models, and Applications, Second Edition facilitates the process of planning, conducting, and assessing program evaluations. The highlighted evaluation approaches include: Experimental and quasi-experimental design evaluations Daniel L. Stufflebeam's CIPP Model Michael Scriven's Consumer-Oriented Evaluation Michael Patton's Utilization-Focused Evaluation Robert Stake's Responsive/Stakeholder-Centered Evaluation Case Study Evaluation Key readings listed at the end of each chapter direct readers to the most important references for each topic. Learning objectives, review questions, student exercises, and instructor support materials complete the collection of tools. Choosing from evaluation approaches can be an overwhelming process, but Evaluation Theory, Models, and Applications, Second Edition updates the core evaluation concepts with the latest research, making this complex field accessible in just one book.

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery. The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations. This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.

Building Applications with iBeacon

High-precision location information is increasingly useful for mobile application developers, since it allows devices to interact with the world around them. This practical book shows you how to achieve arm’s reach accuracy with iBeacons, simple transmitters that enable your applications to react to nearby surroundings and then deliver timely, relevant information—especially indoors, where GPS and cell service are inaccurate.

Microsoft SQL Server 2014 Query Tuning & Optimization

Optimize Microsoft SQL Server 2014 queries and applications Microsoft SQL Server 2014 Query Tuning & Optimization is filled with ready-to-use techniques for creating high-performance queries and applications. The book describes the inner workings of the query processor so you can write better queries and provide the query processor with the quality information it needs to produce efficient execution plans. You’ll also get tips for troubleshooting underperforming queries. In-Memory OLTP (Hekaton), a key new feature of SQL Server 2014, is fully covered in this practical guide. Understand how the query optimizer works Troubleshoot queries using extended events, SQL trace, dynamic management views (DMVs), the data collector, and other tools Work with query operators for data access, joins, aggregations, parallelism, and updates Speed up queries and dramatically improve application performance by creating the right indexes Understand statistics and how to detect and fix cardinality estimation errors Maximize OLTP query performance using In-Memory OLTP (Hekaton) features, including memory-optimized tables and natively compiled stored procedures Monitor and promote plan caching and reuse to improve application performance Improve the performance of data warehouse queries using columnstore indexes Handle query processor limitations with hints and other methods

PostgreSQL Administration Essentials

PostgreSQL Administration Essentials is your practical guide to effectively managing your PostgreSQL databases with confidence. In this book, you will learn techniques for backups and recovery, performance tuning, and replication management, and gain valuable insights into database monitoring and administration, all tailored to ensure the smooth operation and optimization of your database systems. What this Book will help me do Back up and restore PostgreSQL databases efficiently to prevent data loss. Set up and manage PostgreSQL replication to ensure high availability. Monitor and analyze database performance to maintain an optimized environment. Handle user permissions securely to manage database access effectively. Detect performance bottlenecks and optimize indexes for faster queries. Author(s) Hans-Jürgen Schönig is a seasoned database professional with extensive experience working with PostgreSQL in production environments. Having provided consulting and training services in the database field, Hans shares deep insights into practical database administration techniques. Through his books and courses, he focuses on making complex topics accessible and actionable for professionals. Who is it for? This book is ideal for database administrators who want to quickly gain practical PostgreSQL skills. Database developers or project managers aiming to understand database administration and optimization will find this resource valuable. Beginners wishing to familiarize themselves with PostgreSQL basics to advance their careers will also benefit greatly. For those already experienced in other database platforms, this book provides insights to transition into using PostgreSQL effectively.

IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines

This IBM® Redbooks® publication captures several of the preferred practices that are based on field experience and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and Storwize® V7000 V7.2. This book begins with a look at the latest developments with SAN Volume Controller and Storwize V7000 and reviews the changes in the previous versions of the product. It highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then, this book provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. Next, it provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. Finally, this book highlights several scenarios that demonstrate the preferred practices and performance guidelines.

IBM PowerKVM Configuration and Use

This IBM® Redbooks® publication presents the new IBM PowerKVM virtualization for scale-out Linux systems. This book describes the concepts of PowerKVM and how you can deploy your virtual machines with the software stack included in the product. It helps you install and configure PowerKVM on your Power System server and provides guidance for managing the supported virtualization features by using the Web interface and command-line interface (CLI). This information for professionals who want to acquire a better understanding of PowerKVM virtualization technology to optimize Linux workload consolidation and use the new POWER8 processor features. The intended audience also includes people in these roles: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors Open source community IBM OpenPower™ partners It does not replace the latest marketing materials and configuration tools. It is intended as an additional source of information that, together with existing sources, can be used to enhance your knowledge of IBM virtualization solutions. Before you start reading, you must be familiar with the general concepts of kernel-based virtual machine (KVM), Linux, and IBM Power architecture.

IBM MQ V8 Features and Enhancements

The power of IBM® MQ is its flexibility combined with reliability, scalability, and security. This flexibility provides a large number of design and implementation choices. Making informed decisions from this range of choices can simplify the development of applications and the administration of an MQ messaging infrastructure. Applications that access such an infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use IBM MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business. IBM MQ V8.0 was released in June 2014. Before that release, the product name was IBM WebSphere® MQ. This IBM Redbooks® publication covers the core enhancements made in IBM MQ V8 and the concepts that must be understood. A broad understanding of the product features is key to making informed design and implementation choices for both the infrastructure and the applications that access it. Details of new areas of function for IBM MQ are introduced throughout this book, such as the changes to security, publish/subscribe clusters, and IBM System z exploitation. This book is for individuals and organizations who make informed decisions about design and applications before implementing an IBM MQ infrastructure or begin development of an IBM MQ application.

Hadoop in Practice, Second Edition

Hadoop in Practice, Second Edition provides over 100 tested, instantly useful techniques that will help you conquer big data, using Hadoop. This revised new edition covers changes and new features in the Hadoop core architecture, including MapReduce 2. Brand new chapters cover YARN and integrating Kafka, Impala, and Spark SQL with Hadoop. You'll also get new and updated techniques for Flume, Sqoop, and Mahout, all of which have seen major new versions recently. In short, this is the most practical, up-to-date coverage of Hadoop available anywhere About the Technology About the Book It's always a good time to upgrade your Hadoop skills! Hadoop in Practice, Second Edition provides a collection of 104 tested, instantly useful techniques for analyzing real-time streams, moving data securely, machine learning, managing large-scale clusters, and taming big data using Hadoop. This completely revised edition covers changes and new features in Hadoop core, including MapReduce 2 and YARN. You'll pick up hands-on best practices for integrating Spark, Kafka, and Impala with Hadoop, and get new and updated techniques for the latest versions of Flume, Sqoop, and Mahout. In short, this is the most practical, up-to-date coverage of Hadoop available. Readers need to know a programming language like Java and have basic familiarity with Hadoop. What's Inside Thoroughly updated for Hadoop 2 How to write YARN applications Integrate real-time technologies like Storm, Impala, and Spark Predictive analytics using Mahout and RR About the Reader About the Author Alex Holmes works on tough big-data problems. He is a software engineer, author, speaker, and blogger specializing in large-scale Hadoop projects. Quotes Very insightful. A deep dive into the Hadoop world. - Andrea Tarocchi, Red Hat, Inc. The most complete material on Hadoop and its ecosystem known to mankind! - Arthur Zubarev, Vital Insights Clear and concise, full of insights and highly applicable information. - Edward de Oliveira Ribeiro, DataStax, Inc. Comprehensive up-to-date coverage of Hadoop 2. - Muthusamy Manigandan, OzoneMedia