talk-data.com talk-data.com

Topic

data-engineering

3377

tagged

Activity Trend

1 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
IBM ESS and IBM DB2 UDB Working Together

This IBM Redbooks publication gives you information to use the IBM Enterprise Storage Subsystem with IBM DB2 Universal Database. Most of the information presented here applies to UNIX and Windows environments. Our examples are only for AIX. First, we supply an overview of the products that we use in our environment and introduce the terminology. Next, we discuss the configuration options available for these products and the methodology that we recommend for sizing an Enterprise Storage Subsystem for use with the DB2 Universal Database. We also discuss the challenges of mapping the system resources to the database activity in an ESS environment, and we discuss the diagnostic tools which are available and how to use them when working with performance issues. Then we discuss backup and recovery and explain some of the new features available with DB2 UDB V7.2, which enable some of the ESS capabilities. Last, we include our test examples. This book is intended to be read by systems administrators, storage specialists, database administrators and database specialists. We assume a base knowledge of either: ESS, AIX and/or DB2 and intend that this book will help you understand your area of expertise in a wider context.

Oracle RMAN Pocket Reference

Oracle RMAN Pocket Reference is a handy guide for DBAs who intend to use Oracle Recovery Manager for database backup and recovery. Because Recovery Manager (RMAN) is a relatively new tool, many DBAs are just becoming familiar with it. They will welcome a timely book that explains clearly and concisely how to use RMAN for common backup and recovery tasks that are infrequent, yet extremely vital. The first portion of the book is primarily task-oriented. After a short section on RMAN architecture, the book shows (in checklist style) how to perform common backup and recovery tasks such as: Implementing a recovery catalog Creating and running RMAN scripts Configuring input/output channels Taking a full database backup Backing up tablespaces and datafiles Taking incremental backups Recovering lost datafiles The second portion of the book consists of a handy syntax reference to the many RMAN commands. Having a quick reference to RMAN commands is a great convenience to DBAs who otherwise, often under the pressure of a recovery situation, would have to wade through Oracle's online documentation.

Backing Up Oracle Using Tivoli Storage Management

This IBM Redbooks publication is designed to assist Oracle Database administrators and system/storage administrators with Oracle backup solutions using Tivoli Storage Manager V4.1. The primary tool we used for backup and recovery is Tivoli Data Protection (TDP) for Oracle V1.1, and the book covers setup and configuration of TDP as well as day-to-day management examples. Operating environments covered by the project are AIX, Sun Solaris, and Microsoft Windows 2000. We provide an overview of relational database management systems and how to plan for protecting them. This book will help you install, tailor, and configure Tivoli Storage Manager and Tivoli Data Protection for Oracle on UNIX and Microsoft Windows 2000 platforms in order to accomplish backup and restore of Oracle8i databases. RMAN commands and setup are covered in detail, and emphasis is placed on practical recovery scenarios. Also featured are new solutions utilizing Tivoli's hardware integration features for IBM's ESS intelligent storage subsystem, as well as an update on using TDP for Oracle V2.2 new features. Note: This book replaces relevant sections of the earlier book, Using ADSM to Back Up Databases, SG24-4335-03, by updating and re-branding the content of that book.

Applied SOAP: Implementing .NET XML Web Services

This book takes the reader from the architecture of .NET to real-world techniques they can use in their own Internet applications. The reader is introduced to .NET and Web Services and explores (in detail) issues surrounding the fielding of successful Web Services. Practical guidelines as well as solutions are provided that the rader may use in their own projects. Some of the issues involve lack of specific guidance in the SOAP specification, while others transcend SOAP and involve issues Internet developers have grappled with since the inception of the World Wide Web. At this time, this book has no competition.

S/390 Partners in Development: ThinkPad Enabled for S/390

A ThinkPad Enabled for S/390, generally known as a ThinkPad/EFS system, is the smallest S/390 currently available, and is intended for development and demonstration purposes. It is based on an IBM ThinkPad running Linux, and the S/390 emulation product FLEX-ES. FLEX-ES is a product of Fundamental Software, Incorporated (FSI) of Fremont, California. This package (the ThinkPad, Linux, and FLEX-ES) can run all current S/390 operating systems. This IBM Redbooks publication introduces the ThinkPad/EFS system, describes the setup process of the system in some detail, and then describes the installation and use of an OS/390 package known as the OS/390 AD CD-ROM system. While this publication is primarily directed at members of the IBM S/390 Partners in Development program (also known as PartnerWorld), most of the content applies to any ThinkPad/EFS system.

PostgreSQL Essential Reference

PostgreSQL Essential Reference is a reference book for developers and system administrators who are already familiar with SQL database concepts but that need clear and concise documentation that is specific to PostgreSQL. The book is divided into 3 parts; Basic SQL Reference, PostgreSQL specifics, and PostgreSQL administration. On a whole, it provides a command, the syntax, available options, description, and example code. Readers will be able to easily utilize the code and concepts into their use f the product. An added advantage to this book is that provides all reference material in two ways; alphabetically and by task. This is important because readers of the book will be looking for this information by both methods.

MQSeries Publish/Subscribe Applications

Publish and Subscribe is an effective way of disseminating information to multiple users. Publish/Subscribe applications can help to enormously simplify the task of getting business messages and transactions to a wide, dynamic and potentially large audience in a timely manner. This IBM Redbooks publication positions the MQSeries Publish/Subscribe to MQSeries Integrator Publish/ Subscribe. It will help you create, tailor and configure an application from publishing data through to subscribing via web pages. The books provides a broad understanding of a building and running an entire publish/subscribe solution. It will help give you a quick start to design and create a solution and then migrate it from MQSeries Publish/Subscribe to MQSeries Integrator Publish/Subscribe.

Strategic XML

Strategic XML analyses the IT systems of a typical large corporation and gives specific, fully-functional examples that show how XML can solve problems today while positoning your company for the demands of tomorrow. Strategic XML addresses: XML Web content publishing, a simple workflow system, an offline order processing system, SOAP client and server examples, legacy system integration (using COBOL), and a unified Web and print documentation system based on XML and XSL.

Streamlined Object Modeling: Patterns, Rules, and Implementation

A rigorous and practical framework for modeling business systems Pares object modeling down to its core concepts, making it easier than ever. Twelve object collaboration patterns that address virtually any business scenario Powerful techniques–not fancy notation! Streamlined Object Modeling presents the first rigorous, practical framework for object modeling complex business domains, rules, and systems. Three world-renowned leaders in object development have pared object modeling down to the core concepts for all business domains, business rules, and business services. Starting from the first principles of "object think," the authors offer a fully integrated approach to building, validating, and critiquing object models. Coverage includes: Proven principles and techniques for successfully modeling the structure and operations of any business domain. Guidelines for finding and associating objects, assembling object models, and distributing system behavior among objects. Rigorous methods for discovering, organizing, and implementing business rules around objects. Twelve all-encompassing "collaboration patterns"–what they represent, how they relate, and how to apply them. Five kinds of business rules, three types of services, and six categories of properties completely specify object-oriented business requirements From start to finish, the book makes extensive use of examples drawn from real commercial applications. To illustrate how streamlined object modeling flows from analysis to code, it also presents a complete case study derived from a real-world application, and implemented in two leading object-oriented languages-Java, and the Squeak implementation of Smalltalk.

AIX Fast Connect for AIX Version 3.1 Guide

Fast Connect for AIX, announced with AIX 4.3.2, was IBM's first step to let PCs take advantage of the performance, scalability, and reliability of AIX. The new version 3.1 adds powerful new features, such as user name mapping and remote password change. This IBM Redbooks publication walks you through the installation and the setup of Fast Connect on your server. It shows how to customize this product by declaring file shares, and print shares. Because security and ease of administration of the password databases on the network are two important tasks for the system administrator, this book describes which security models are available and how to set up your PC clients to communicate with the Fast Connect for AIX server. For its in depth coverage of the Fast Connect for AIX product, this book is a must-read for I/T specialists who have to recommend a solution for AIX and PC interoperability, as well as system administrators who have to implement such a solution.

Special Edition Using Oracle® 11i

The first part of Special Edition Using Oracle 11i introduces the Oracle ERP applications and R11i concepts. The reader is then educated on proven techniques for implementing these complex and integrated systems. Configuration and usage of each of the financial, distribution, manufacturing, HRMS, and projects applications are covered, followed by a discussion of working with Oracle Support, consulting firms, and compatible software vendors. The appendixes review the employment market, consulting opportunities, and provide the reader with an implementation checklist. All of R11i's new features are covered in-depth and in practical terms. Not only will readers understand Oracle's new capabilities, they will be able to apply them right away.

Design and Implementation of DSL-Based Access Solutions

The ultimate DSL deployment guides and reference Teaches the reader how to design and implement the network to offer services such as voice, video, and data Explains the various access and core architectures for xDSL technologies Details how to do mass provisioning and how to manage an end-to-end network Includes case studies that depict some of the most common deployed architectures, how they evolved, problems they faced, and how they were overcome Design and Implementation of DSL-Based Access Solutions addresses various architectures for DSL-based networks. It focuses on how to design and implement an end-to-end solution for service providers, considering various business models such as retail, wholesale, VPN, etc. This book depicts the different architectures, and helps you understand the key design principles in deploying them. It covers both access encapsulations such as bridging, PPPoA, PPPoE, and routing, as well as core architectures such as IP, L2TP, MPLS/VPN, and ATM. Because it focuses on end-to-end solutions, Design and Implementation of DSL-Based Access Solutions talks about how to do mass provisioning of subscribers and how to manage networks in the most efficient way. It also includes discussions of real-life deployments, their design-related issues, and their implementation.

F. Scott Barker’s Microsoft Access 2002 Power Programming

F. Scott Barker's Access 2002 Power Programming gives many practical techniques for the corporate and independent developer. The main topics covered are: The Root of Power Programming; Manipulating and Presenting Data; Extending Access with Interoperability; Adding the Professional Look and Distributing Applications; Managing Databases; Adding Finishing Touches. New features of Access 2002 will be covered thoroughly, including: A whole new chapter devoted to Data Pages, which is Microsoft's way of bringing the Web interface into everyday office solutions. A new chapter clarifying the confusion over ADP/MDB and DAO/ADO. Including when and where to use each. There are a number of new additions to VBA which developers will need good exposure to in order to take advantage of them. A number of changes have been implemented in the form design with control features added.

Mining Your Own Business in Health Care Using DB2 Intelligent Miner for Data

The new challenge of integrated solutions is to get more knowledge from data in order to build the most valuable solutions. This IBM Redbooks publication is a solution guide to address the business issues in health care by real usage experience and to position the value of DB2 Intelligent Miner for Data in a Business Intelligence architecture as an integrated solution. Typical health care issues are addressed in this book, such as: How to calculate weight for diagnoses related groups? Are there characteristic groups of patients in my population? Can we optimize medical tests for a specific disease? Can we detect precauses for a special medical condition? This book also describes a data mining method to ensure that the optimum results are obtained. It details for each business issue: - What common data model to use - How to source the data - How to evaluate the model - What data mining technique to use - How to interpret the results - How to deploy the model Business users who want to know the payback on their organization when using the DB2 Intelligent Miner for Data solution should read the sections about the business issues, how to interpret the results, and how to deploy the model in the enterprise. Implementers who want to start using mining techniques should read the sections about how to define the common data model to use, how to source the data, and how to choose the data mining techniques.

Special Edition Using SOAP

This book will introduce the reader to SOAP and serve as a comprehensive reference to both experienced and new developers in the area. Only one other book completely dedicated to SOAP is currently on the market, and it has strong sales because no other information is available. SE Using SOAP will capture more readers than the competition because it provides real-world examples and troubleshooting with complete data conversion information. The emphasis will be on getting started fast instead of reading through white paper-style theory in hopes of finding applicable information. By reading this book and working through the examples, the reader will be well versed in SOAP and its applications immediately. SE Using SOAP includes difficult to find information on how SOAP works with different languages and protocols including Visual Basic.NET, Visual Basic 6, C#, XML, HTTP, SDL, DISCO, COM, SQL Server, plus much more. Also covers how to work with PDAs, an ever-growing need in the data transfer market.

DATA WAREHOUSING FUNDAMENTALS: A Comprehensive Guide for IT Professionals

Geared to IT professionals eager to get into the all-important field of data warehousing, this book explores all topics needed by those who design and implement data warehouses. Readers will learn about planning requirements, architecture, infrastructure, data preparation, information delivery, implementation, and maintenance. They'll also find a wealth of industry examples garnered from the author's 25 years of experience in designing and implementing databases and data warehouse applications for major corporations. Market: IT Professionals, Consultants.

Outsourcing Dilemma: The Search for Competitiveness, The

Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology. Despite the circumstances, most organizations are left with no alternative but to keep trying to improve their systems. They then have two basic alternatives. They can either do it in-house by buying the necessary equipment, software, and external help, or they can externalize the function completely by taking one of the outsourcing routes. Research undertaken into project failure rates at the beginning of 2000 has provided the author with a unique insight into the real level of success obtained from choosing either internal or external solutions to the competitive problem. The Outsourcing Dilemma presents the arguments for and against outsourcing and suggests ways in which the enormous problems of maintaining competitiveness might be approached. The book examines: the changing times that have brought about the need to be competitive in all functions the various internal solutions to the problem of maintaining competitiveness the advantages and disadvantages of the external solution of outsourcing the extent to which outsourcing is being practiced and the functions being outsourced the growing range of alternatives to full outsourcing a range of factors that potential clients should know about outsourcing providers factors to consider when choosing an outsourcing service provider alternative options toward achieving lasting competitiveness The Outsourcing Dilemma includes controversial case studies highlighting the advantages and potential pitfalls of outsourcing, and a revolutionary long-term competitiveness option - "Business Satellites" - that does not require short-term dramatic change, expense, and disruption. Competitive advantage is a choice. Who are you going to entrust it to?

Mining Your Own Business in Telecoms Using DB2 Intelligent Miner for Data

The new challenge of integrated solutions is to get more knowledge from data in order to build the most valuable solutions. This IBM Redbooks publication is a solution guide to address the business issues in telecommunications by real usage experience and to position the value of DB2 Intelligent Miner for Data in a Business Intelligence architecture as an integrated solution. Typical telecoms issues are addressed in this book, such as: What are the characteristics of your customers? Can you predict the customers who are likely to leave? How do you discover the true value of your customers? This book also describes a data mining method to ensure that the optimum results are obtained. It details for each business issue: - What common data model to use - How to source the data - How to evaluate the model - What data mining technique to use - How to interpret the results - How to deploy the model Business users who want to know the payback on their organization when using the DB2 Intelligent Miner for Data solution should read the sections about the business issues, how to interpret the results, and how to deploy the model in the enterprise. Implementers who want to start using mining techniques should read the sections about how to define the common data model to use, how to source the data, and how to choose the data mining techniques.

Mining Your Own Business in Banking Using DB2 Intelligent Miner for Data

The new challenge of integrated solutions is to get more knowledge from data in order to build the most valuable solutions. This IBM Redbooks publication is a solution guide to address the business issues in banking by real usage experience and to position the value of DB2 Intelligent Miner For Data in a Business Intelligence architecture as an integrated solution. Typical banking issues are addressed in this book, such as: How can you discover the characteristics of your customers? Which products can you sell to which customers and how? This book also describes a data mining method to ensure that the optimum results are obtained. It details for each business issue: - What common data model to use - How to source the data - How to evaluate the model - What data mining technique to use - How to interpret the results - How to deploy the model Business users who want to know the payback on their organization when using the DB2 Intelligent Miner For Data solution should read the sections about the business issues, how to interpret the results, and how to deploy the model in the enterprise. Implementers who want to start using mining techniques should read the sections about how to define the common data model to use, how to source the data, and how to choose the data mining techniques.

SQL Server DTS

This book appeals to both developers and database administrators who are faced with the common situation of having to migrate or integrate data from one location into another. While the first section of the book is designed for the beginner to DTS, it is assumed that the reader has at least basic database and programming experience. The second section is extensive coding, and is best used by someone with intermediate to advanced programming skills. The third section contains a mix of examples that will be useful to all levels of database administrators and programmers. For the readers who have been using DTS this section can be used as a reference section and help with DTS designs and usage. Unlike other resources available, this book covers data transformation in both SQL Server 7 and 2000.