talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

3406

Collection of O'Reilly books on Data Engineering.

Filtering by: data ×

Sessions & talks

Showing 2026–2050 of 3406 · Newest first

Search within this event →
IBM SmartCloud Storage Access V1.1 Configuration Cookbook

This IBM® Redbooks® publication will help you learn how to build a storage cloud with the IBM SmartCloud™ Storage Access solution, which consists of multiple hardware and software products including IBM Scale Out network Attached Storage (SONAS), IBM Storwize® V7000 Unified, IBM Tivoli® Storage Productivity Center, and more. To get you started, we cover the planning, installation, and configuration for each component. SmartCloud Storage Access is an IBM software product for storage cloud management that enables the cloud service with virtualization and automation. SCSA is the focal point to administer the storage cloud environment providing a self-service provision approach for the storage cloud users. New storage capacity can be easily deployed and accessed by the Internet or intranet. SmartCloud Storage Access also supports simple and fast resource elasticity as user demand changes. With the SmartCloud Storage Access solution, the storage resources will be displayed as unified resource pools with different service levels. Users no longer need to know the exact location of their files and there is no more need to configure the underlying storage subsystems manually. All storage resources are still well monitored and the cloud administrators can easily track the historical storage resource utilization. This publication is intended for anyone who wants to understand more about IBM SmartCloud Storage Access planning, implementation, configuration, and usage. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

Microsoft® Access® 2013 Step by Step

Experience learning made easy—and quickly teach yourself how to build your own database with Access 2013. With Step by Step, you set the pace—building and practicing the skills you need, just when you them! Includes downloadable practice files and a companion eBook. Build a database from scratch or ready templates Create easy-to-use data-entry forms Write queries to extract and manipulate data Design reports to summarize data in effective ways Import data from other databases and documents

Microsoft® SQL Server® 2012 Step by Step

Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012 Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing exercises for building database solutions that solve real-world business problems. Discover how to: Install and work with core components and tools Create tables and index structures Manipulate and retrieve data Secure, manage, back up, and recover databases Apply techniques for building high-performing applications Use clustering, database mirroring, and log shipping

Database Design for Mere Mortals®: A Hands-on Guide to Relational Database Design, Third Edition

The #1 Easy, Commonsense Guide to Database Design! Michael J. Hernandez’s best-selling Database Design for Mere Mortals® has earned worldwide respect as the clearest, simplest way to learn relational database design. Now, he’s made this hands-on, software-independent tutorial even easier, while ensuring that his design methodology is still relevant to the latest databases, applications, and best practices. Step by step, shows you how to design databases that are soundly structured, reliable, and flexible, even in modern web applications. Hernandez guides you through everything from database planning to defining tables, fields, keys, table relationships, business rules, and views. You’ll learn practical ways to improve data integrity, how to avoid common mistakes, and when to break the rules. Database Design for Mere Mortals ® , Third Edition, Coverage includes Understanding database types, models, and design terminology Discovering what good database design can do for you—and why bad design can make your life miserable Setting objectives for your database, and transforming those objectives into real designs Analyzing a current database so you can identify ways to improve it Establishing table structures and relationships, assigning primary keys, setting field specifications, and setting up views Ensuring the appropriate level of data integrity for each application Identifying and establishing business rules Whatever relational database systems you use, Hernandez will help you design databases that are robust and trustworthy. Never designed a database before? Settling for inadequate generic designs? Running existing databases that need improvement? Start here.

IBM System Storage DS8000 Copy Services for Open Systems

In today’s highly competitive and real-time environment, the ability to manage all IT operations on a continuous basis makes the creation of copies and backups of data a core requirement for any IT deployment. Furthermore, it is necessary to provide proactive efficient disaster recovery strategies that can ensure continuous data availability for business operations. The Copy Services functions available with the IBM® System Storage® DS8000® are part of these strategies. This IBM Redbooks® publication helps you plan, install, configure, and manage the Copy Services functions of the DS8000 when they are used in Open System and IBM i environments. This book provides the details necessary to implement and control each of the Copy Services functions. Numerous examples illustrate how to use the various interfaces with each of the Copy Services. This book also covers the 3-site Metro/Global Mirror with Incremental Resync feature and introduces the IBM Tivoli® Storage Productivity Center for Replication solution. This book should be read with The IBM System Storage DS8000 Series: Architecture and Implementation, SG24-8886. There is also a companion book, IBM System Storage DS8000 Copy Services for IBM System z®, SG24-6787, which supports the configuration of the Copy Services functions in IBM z/OS® environments.

IBM Parallel Environment (PE) Developer Edition

This publication helps strengthen the position of IBM® software solutions and enables for High Performance Computing (hardware, software, and tools) with a well-defined and documented deployment model within an IBM environment. As a result, customers receive a planned foundation for dynamic infrastructure for parallel High Performance Computing (HPC) applications. This IBM Redbooks® publication addresses topics to take advantage of the strengths of IBM PE Developers Edition for HPC applications. The objective is to solve customer's challenges and maximize systems' throughput, performance, and management. This publication examines the tools, utilities, documentation, and other resources available to help the IBM technical teams provide solutions and support for IBM HPC solutions in an IBM hardware environment. This IBM Redbooks is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing HPC solutions and support.

Perception and Imaging, 4th Edition

How do you experience a photograph? What do you want a viewer to feel when they look at your image? Perception and Imaging explains how we see and what we don't see. Relevant psychological principles will help you predict your viewer's emotional reaction to your photographic images, giving you more power, control, and tools for communicating your desired message. Knowing how our minds work helps photographers, graphic designers, videographers, animators, and visual communicators both create and critique sophisticated works of visual art. Benefit from this insight in your work. Topics covered in this book: gestalt grouping, memory and association, space, time, color, contours, illusion and ambiguity, morphics, personality, subliminals, critiquing photographs, and rhetoric.

IBM System Storage DS8000 Copy Services for IBM System z

In today’s highly competitive and real-time environment, the ability to manage all IT operations on a continuous basis makes the creation of copies and backups of data a core requirement for any IT deployment. Furthermore, it is necessary to provide proactive efficient disaster recovery strategies that can ensure continuous data availability for business operations. The Copy Services functions available with the IBM® System Storage® DS8000® are part of these strategies. This IBM Redbooks® publication helps you plan, install, configure, and manage the Copy Services functions of the DS8000 when they are used in Open System and IBM i environments. This book provides the details necessary to implement and control each of the Copy Services functions. Numerous examples illustrate how to use the various interfaces with each of the Copy Services. This book also covers the 3-site Metro/Global Mirror with Incremental Resync feature and introduces the IBM Tivoli® Storage Productivity Center for Replication solution. This book should be read with The IBM System Storage DS8000 Series: Architecture and Implementation, SG24-8886. There is also a companion book, IBM System Storage DS8000 Copy Services for IBM System z, SG24-6787, which supports the configuration of the Copy Services functions in IBM z/OS® environments.

IBM System Storage DS8000: Host Attachment and Interoperability

This IBM® Redbooks® publication addresses host attachment and interoperability considerations for the IBM System Storage® DS8000® series. Within this book, you can find information about the most popular host operating systems platforms, including Windows®, IBM AIX®, VIOS, Linux®, Solaris, HP-UX, VMware, Apple, and IBM z/OS® The topics covered in this book target administrators or other technical personnel with a working knowledge of storage systems and a general understanding of open systems. You can use this book as guidance when installing, attaching, and configuring System Storage DS8000. The practical, usage-oriented guidance provided in this book complements the IBM System Storage DS8000 Host Systems Attachment Guide, SC26-7917.

Cyberethics: Morality and Law in Cyberspace, 5th Edition

The Internet and widespread use of blogging, email, social media and e-commerce have foregrounded new, complex moral issues and dilemmas. Likewise, modern technologies and social networks have brought numerous challenges to legal systems, which have difficulty keeping up with borderless global information technologies. The fully revised and updated Fifth Edition of Cyberethics: Morality and Law in Cyberspace offers an in-depth and comprehensive examination of the social costs and moral issues emerging from ever-expanding use of the Internet and new information technologies. Focusing heavily on content control, free speech, intellectual property, and security, Cyberethics: Morality and Law in Cyberspace provides legal and philosophical discussions of these critical issues.

The updated Fifth Edition includes new sections on Floridi’s Macroethics, gatekeepers and search engines, censorship, anti-piracy legislation, patents, and smartphones. Real-life case studies, including all-new examples focusing on Google, Facebook, video games, reader’s rights, and the Lulz Sec Hackers, provide real-world context. Ideal for undergraduate computer ethics courses as well as a general readership, Cyberethics is an excellent resource for students and laypeople alike.

Key Features: •Additional and revised content on P2P networks, hacktivists, cybercrime, a user's ability to control and monitor cookies in IE, mobilization data, online surveillance, threats posed by social networking, invasive commercial initiatives, Wikileaks, and more. •Examines the threat of the Internet on our privacy as consumers and employees, with a focus on covert information gathering, the use of "Cookies" and spyware. •End-of-chapter questions and case studies encourage critical thinking •Discusses the common ethical and public policy problems that have arisen and how technology or law would propose to solve these issues •Provides an unbiased review of Internet governance regulations

Computation and Storage in the Cloud

Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications

Developing with Couchbase Server

Today’s highly interactive websites pose a challenge for traditional SQL databases—the ability to scale rapidly and serve loads of concurrent users. With this concise guide, you’ll learn how to build web applications on top of Couchbase Server 2.0, a NoSQL database that can handle websites and social media where hundreds of thousands of users read and write large volumes of information. Using food recipe information as examples, this book demonstrates how to take advantage of Couchbase’s document-oriented database design, and how to store and query data with various CRUD operations. Discover why Couchbase is better than SQL databases with memcached tiers for managing data from the most interactive portions of your application. Learn about Couchbase Server’s cluster-based architecture and how it differs from SQL databases Choose a client library for Java, .NET, Ruby, Python, PHP, or C, and connect to a cluster Structure data in a variety of formats, from serialized objects, a stream of raw bytes, or as JSON documents Learn core storage and retrieval methods, including document IDs, expiry times, and concurrent updates Create views with map/reduce and learn Couchbase mechanisms for querying and selection

Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today. This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.

Oracle Exadata Recipes: A Problem-Solution Approach

Oracle Exadata Recipes takes an example-based, problem/solution approach in showing how to size, install, configure, manage, monitor, optimize, and migrate Oracle database workloads on and to the Oracle Exadata Database Machine. Whether you're an Oracle Database administrator, Unix/Linux administrator, storage administrator, network administrator, or Oracle developer, Oracle Exadata Recipes provides effective and proven solutions to accomplish a wide variety of tasks on the Exadata Database Machine. You can feel confident using the reliable solutions that are demonstrated in this book in your enterprise Exadata environment. Managing Oracle Exadata is unlike managing a traditional Oracle database. Oracle's Exadata Database Machine is a pre-configured engineered system comprised of hardware and software, built to deliver extreme performance for Oracle Database workloads. Exadata delivers extreme performance by offering an optimally balanced hardware infrastructure with fast components at each layer of the engineered technology stack, as well as a unique set of Oracle software features designed to leverage the high-performing hardware infrastructure by reducing I/O demands. Let Oracle Exadata Recipes help you translate your existing Oracle Database knowledge into the exciting new growth area that is Oracle Exadata. Helps extend your Oracle Database skillset to the fast-growing, Exadata platform Presents information on managing Exadata in a helpful, example-based format Clearly explains unique Exadata software and hardware features What you'll learn Install and configure Exadata Manage your Exadata hardware infrastructure Monitor and troubleshoot performance issues Manage smart scan and cell offload processing Take advantage of Hybrid Columnar Compression Deploy Smart Flash Cache and Smart Flash Logging Ensure the health of your Exadata environment Who this book is for Oracle Exadata Recipes is for Oracle Database administrators, Unix/Linux administrators, storage administrators, backup administrators, network administrators, and Oracle developers who want to quickly learn to develop effective and proven solutions without reading through a lengthy manual scrubbing for techniques. Readers in a hurry will appreciate the recipe format that sets up solutions to common tasks as the centerpiece of the book.

Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms. The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read. Illustrates linguistic, correlative, and network analysis of OSINT Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression Shows activists fighting against oppressive regimes how they can protect their identities online If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.

Creating Value-Based Archiving Solutions with IBM Content Collector

This IBM® Redbooks® publication describes how the IBM Content Collector family of products can help companies to create value-based archiving solutions. IBM Content Collector provides enterprise-wide content archiving and retention management capabilities. It also provides IT administrators with a high level of control over the archiving environment. From a common interface, organizations can implement policies that define what gets archived from which source system, make decisions about how content gets archived based on the content or metadata of the information, and determine the retention and governance rules associated with that type of content. Content Collector enables IT staff to implement granular archiving policies to collect and archive specific pieces of information. IBM Content Collector helps with the following tasks: Eliminating point solutions and lowering costs with a unified collection, management, and governance approach that works effectively across a broad range of source systems and information types Appraising, improving understanding of, culling, and properly selecting the information to archive Retaining, holding, and disposing of archived content efficiently and defensibly Eliminating the costs and risks inherent with over-retention This book covers the basic concepts of the IBM Content Collector product family. It presents an overview explaining how it provides value-based archiving and a defensible disposal capability in the archiving solutions. With the integration of IBM Content Classification and IBM Enterprise Records, the book also explains and showcases how these products can be used to add more flexibility, power, and capabilities to archiving solutions. The book is intended for IT architects and solution designers who need to understand and use IBM Content Collector for archiving solution implementations. Use cases are included to provide specific, step-by-step details about implementing common solutions that fulfill some of the general business requirements.

Agile SAP: Introducing flexibility, transparency and speed to SAP implementations

Invaluable practical advice Many SAP projects use waterfall methodologies, but these often run into budgeting and scheduling problems. In this unique book, Sean Robson presents ways of improving SAP implementations and offers practical advice on the most effective way to see a project through from beginning to end. Basing his strategies on the twelve principles of the Agile Manifesto, and drawing on his vast experience, he particularly focuses on the use of Scrum and Kanban and their suitability for certain types of projects, enabling you to select the most appropriate method for the task in hand. Apply it to your projects As you read this book, you will understand how to: " Bring your SAP projects in on time and within budget Build more flexibility and transparency in to your implementations, enabling you to adapt more quickly to your clients' needs Realize cost savings as you analyze your expenditure, reduce waste and increase efficiencies in the delivery cycle Increase customer loyalty as you adopt 'best practice' in order to maintain consistently high standards Work more effectively as you increase collaboration within the company and reduce the stress that so often accompanies large-scale projects Improve clarity of requirements and eliminate unnecessary paperwork.

XML and InDesign

Discover the power of XML publishing with InDesign, and create content for multiple applications—including digital-first publishing workflows. With this book, XML evangelist Dorothy Hoskins teaches you several techniques for working with the built-in XML capabilities of InDesign CS6, using real examples from a college course-catalog project. Learn how to import database content into InDesign, and tag existing InDesign content as XML for export to other applications. InDesign also lets you apply attractive styling to XML content that can’t be done with XSL-FO. Through step-by-step instructions, code examples, and lots of screen shots, you’ll discover how using XML with InDesign increases the value of your content. Get an overview of structured (XML) content Learn InDesign’s XML import options, including XML image information Mingle XML and non-XML content in a text flow Use InDesign as an XML "skin" by making templates with new style definitions Put content in "XML order" for export to EPUB, with InDesign CS5.5 and CS6 Dive into advanced topics, such as how to transform XML with XSL Understand InDesign’s potential and limitations with complex content models such as DocBook and DITA

IBM System Storage DS5000 Series Hardware Guide

This IBM® Redbooks® publication consolidates, in one document, detailed descriptions of the hardware configurations and options offered as part of the IBM System Storage DS5000 families of products. This edition covers updates and additional functions available with the IBM System Storage DS® Storage Manager Version 10.77 (firmware level 7.77). This book presents the concepts and functions used in planning and managing the storage servers, such as multipathing and path failover. The book offers a step-by-step guide to using the Storage Manager to create arrays, logical drives, and other basic (as well as advanced) management tasks. This publication also contains practical information about diagnostics and troubleshooting, and includes practical examples of how to use scripts and the command-line interface. This publication is intended for customers, IBM Business Partners, and IBM technical professionals who want to learn more about the capabilities and advanced functions of the DS5000 series of storage servers with Storage Manager Software V10.77. It also targets those who have a DS5000 storage subsystem and need detailed advice about how to configure it. This book is designed specifically to address the hardware features and configuration of the IBM System Storage DS5000 family and can be used in conjunction with the following IBM Redbooks publications: IBM System Storage DS5000 Series Implementation and Best Practices Guide, SG24-8024

IMS 12 Selected Performance Topics

IBM® Information Management System (IMS™) provides leadership in performance, reliability, and security to help you implement the most strategic and critical enterprise applications. IMS, IMS utilities, and IMS tools continue to evolve to provide value and meet the needs of enterprise customers. With IMS 12, integration and open access improvements provide flexibility and support business growth requirements. Scalability improvements have been made to the well-known performance, efficiency, availability, and resilience of IMS by using 64-bit storage. In this IBM Redbooks® publication we provide IMS performance monitoring and tuning information by describing the key IMS performance functions and by showing how to monitor and tune them with traditional and new strategic applications. This book is for database administrators and system programmers. We summarize methods and tools for monitoring and tuning IMS systems, describe IMS system-wide performance, database, and transaction considerations. Based on lab measurements, we provide information about recent performance enhancements that are available with IMS 12, and advice about setting performance-related parameters.

BizTalk 2010 EDI for Health Care: HIPAA Compliant 837 Solutions

Building a successful health care claims processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the 837 EDI standard, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and something that can be managed and extended for years to come. The topics in this book include building complete inbound and outbound solutions for 837 Institutional and Professional EDI document types. In addition, topics around 997/999 acknowledgements and related document types are included. Covering mapping, trading partner configuration, AS2, SFTP, data extraction, data routing, and batching, you will find this to be a goldmine of information to aid you in a successful implementation. What you'll learn Successfully create HIPAA compliant 837 Professional implementations Build fully operational inbound and outbound processes using AS2, SFTP, and FTP Integrate with SQL Server, .NET Libraries, and other platforms and technologies Develop maps, schemas, orchestrations and configure encrypted file delivery Configure batching of documents for various scenarios Who this book is for BizTalk 2010 Developers, technical architects, and executives of Health Care Companies looking to implement BizTalk or EDI, BizTalk 2010

Resilience and Reliability on AWS

Cloud services are just as susceptible to network outages as any other platform. This concise book shows you how to prepare for potentially devastating interruptions by building your own resilient and reliable applications in the public cloud. Guided by engineers from 9apps—an independent provider of Amazon Web Services and Eucalyptus cloud solutions—you’ll learn how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis. This isn’t a book on theory. With detailed examples, sample scripts, and solid advice, software engineers with operations experience will learn specific techniques that 9apps routinely uses in its cloud infrastructures. Build cloud applications with the "rip, mix, and burn" approach Get a crash course on Amazon Web Services Learn the top ten tips for surviving outages in the cloud Use elasticsearch to build a dependable NoSQL data store Combine AWS and PostgreSQL to build an RDBMS that scales well Create a highly available document database with MongoDB Replica Set and SimpleDB Augment Redis with AWS to provide backup/restore, failover, and monitoring capabilities Work with CloudFront and Route 53 to safeguard global content delivery

Data Hiding

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 Dives deep into the less known approaches to data hiding, covert communications, and advanced malware Includes never before published information about next generation methods of data hiding Outlines a well-defined methodology for countering threats Looks ahead at future predictions for data hiding

Designing the Search Experience

Search is not just a box and ten blue links. Search is a journey: an exploration where what we encounter along the way changes what we seek. But in order to guide people along this journey, designers must understand both the art and science of search.In Designing the Search Experience, authors Tony Russell-Rose and Tyler Tate weave together the theories of information seeking with the practice of user interface design. Understand how people search, and how the concepts of information seeking, information foraging, and sensemaking underpin the search process Apply the principles of user-centered design to the search box, search results, faceted navigation, mobile interfaces, social search, and much more Design the cross-channel search experiences of tomorrow that span desktop, tablet, mobile, and other devices

IBM System Storage SAN Volume Controller Best Practices and Performance Guidelines

This IBM® Redbooks® publication captures several of the best practices based on field experience and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller V6.2. This book begins with a look at the latest developments with SAN Volume Controller V6.2 and reviews the changes in the previous versions of the product. It highlights configuration guidelines and best practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then, this book provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. Next, it provides best practices for monitoring, maintaining, and troubleshooting SAN Volume Controller. Finally, this book highlights several scenarios that demonstrate the best practices and performance guidelines. This book is intended for experienced storage, SAN, and SAN Volume Controller administrators and technicians. Before reading this book, you must have advanced knowledge of the SAN Volume Controller and SAN environment. For background information, read the following Redbooks publications: Implementing the IBM System Storage SAN Volume Controller V5.1, SG24-6423 Introduction to Storage Area Networks, SG24-5470