talk-data.com talk-data.com

Topic

data-engineering

3395

tagged

Activity Trend

1 peak/qtr
2020-Q1 2026-Q1

Activities

3395 activities · Newest first

Hadoop Beginner's Guide

Hadoop Beginner's Guide introduces you to the essential concepts and practical applications of Apache Hadoop, one of the leading frameworks for big data processing. You will learn how to set up and use Hadoop to store, manage, and analyze vast amounts of data efficiently. With clear examples and step-by-step instructions, this book is the perfect starting point for beginners. What this Book will help me do Understand the trends leading to the adoption of Hadoop and determine when to use it effectively in your projects. Build and configure Hadoop clusters tailored to your specific needs, enabling efficient data processing. Develop and execute applications on Hadoop using Java and Ruby, with practical examples provided. Leverage Amazon AWS and Elastic MapReduce to deploy Hadoop on the cloud and manage hosted environments. Integrate Hadoop with relational databases using tools like Hive and Sqoop for effective data transfer and querying. Author(s) The author of Hadoop Beginner's Guide is an experienced data engineer with a focus on big data technologies. They have extensive experience deploying Hadoop in various industries and are passionate about making complex systems accessible to newcomers. Their approach combines technical depth with an understanding of the needs of learners, ensuring clarity and relevance throughout the book. Who is it for? This book is designed for professionals who are new to big data processing and want to learn Apache Hadoop from scratch. It is ideal for system administrators, data analysts, and developers with basic programming knowledge in Java or Ruby looking to get started with Hadoop. If you have an interest in leveraging Hadoop for scalable data management and analytics, this book is for you. By the end, you'll gain the confidence and skills to utilize Hadoop effectively in your projects.

OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide

Dive into the essentials of Oracle database administration with "OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide." Whether you're new to Oracle databases or preparing for the Oracle Certified Associate (OCA) certification, this book guides you through the necessary skills and knowledge to succeed, including practical techniques to handle real-world database administration challenges. What this Book will help me do Install and configure the Oracle 11g database software step-by-step. Gain a thorough understanding of Oracle Database architecture and storage structures. Learn to manage Oracle instances, including startup, shutdown, and performance monitoring. Master the skills necessary to perform backups, recoveries, and data migration with Oracle. Prepare effectively for Oracle Database Administration I certification exams utilizing real-world scenarios. Author(s) The authors, experienced Oracle DBAs and educators, bring years of real-world expertise to this guide. With professional experience managing Oracle databases in enterprise settings and teaching database concepts to students and professionals, they aim to make complex topics accessible and engaging. Their practical approach ensures you acquire not just the knowledge but also the confidence to implement what you learn. Who is it for? If you're an aspiring database administrator preparing for the Oracle Certified Associate exam or a professional looking to strengthen your skills in Oracle Database 11g, this book is for you. It's perfect for tech enthusiasts with a basic understanding of databases looking to progress their career. The step-by-step guidance ensures it's suitable for readers at all levels. It bridges the gap between theoretical knowledge and practical expertise.

Programming ArcGIS 10.1 with Python Cookbook

Programming ArcGIS 10.1 with Python Cookbook offers a comprehensive guide for GIS professionals aiming to streamline their workflows using Python scripting within ArcGIS Desktop. This book provides hands-on recipes for automating geoprocessing tasks, managing map data, and creating custom tools, making it an essential resource for mastering efficient GIS operations. What this Book will help me do Understand the fundamentals of Python programming as it applies to GIS. Learn to automate tasks such as map production and geoprocessing. Develop customized tools and add-ons to extend ArcGIS capabilities. Improve efficiencies by fixing data errors and working with feature datasets. Gain the ability to schedule and manage complex GIS workflows using Python scripts. Author(s) Donald Eric Pimpler and Eric Pimpler are seasoned professionals in geospatial analysis, with years of experience incorporating Python programming into GIS workflows. Their approach combines practical insights with easy-to-follow methods, resulting in a clear and impactful guide for advancing your GIS skills. Who is it for? The ideal readers are GIS professionals or students in geographical sciences aiming to enhance their technical skills. Prior basic programming knowledge is helpful but not mandatory. The content is tailored for those looking to automate repetitive geospatial tasks and manage complex spatial datasets efficiently in ArcGIS. This book serves as a practical guide for gaining expertise in combining Python programming with GIS.

ElasticSearch Server

ElasticSearch Server is an excellent resource for mastering the ElasticSearch open-source search engine. This book takes you through practical steps to implement, configure, and optimize search capabilities, suitable for various data sets and applications, making faster and more accurate search outcomes accessible. What this Book will help me do Understand the core concepts of ElasticSearch, including data indexing, dynamic mapping, and search analysis. Develop practical skills in writing queries and filters to retrieve precise and relevant results. Learn to set up and efficiently manage ElasticSearch clusters for scalability and real-time performance. Implement advanced ElasticSearch functions like autocompletion, faceting, and geo-search. Utilize optimization techniques for cluster monitoring, health-checks, and tuning for reliable performance. Author(s) The authors of ElasticSearch Server are industry professionals with extensive experience in search technologies and system architecture. They have contributed to multiple tools and publications in the field of data search and analytics. Their writing aims to distill complex technical concepts into practical knowledge, making it valuable for readers from all backgrounds. Who is it for? This book is perfect for developers, system architects, and IT professionals seeking a robust and scalable search solution for their projects. Whether you're new to ElasticSearch or looking to deepen your expertise, this book will serve as a practical guide to implement ElasticSearch effectively. The only prerequisites are a basic understanding of databases and general query concepts, so prior search server knowledge is not required.

IBM SmartCloud Storage Access V1.1 Configuration Cookbook

This IBM® Redbooks® publication will help you learn how to build a storage cloud with the IBM SmartCloud™ Storage Access solution, which consists of multiple hardware and software products including IBM Scale Out network Attached Storage (SONAS), IBM Storwize® V7000 Unified, IBM Tivoli® Storage Productivity Center, and more. To get you started, we cover the planning, installation, and configuration for each component. SmartCloud Storage Access is an IBM software product for storage cloud management that enables the cloud service with virtualization and automation. SCSA is the focal point to administer the storage cloud environment providing a self-service provision approach for the storage cloud users. New storage capacity can be easily deployed and accessed by the Internet or intranet. SmartCloud Storage Access also supports simple and fast resource elasticity as user demand changes. With the SmartCloud Storage Access solution, the storage resources will be displayed as unified resource pools with different service levels. Users no longer need to know the exact location of their files and there is no more need to configure the underlying storage subsystems manually. All storage resources are still well monitored and the cloud administrators can easily track the historical storage resource utilization. This publication is intended for anyone who wants to understand more about IBM SmartCloud Storage Access planning, implementation, configuration, and usage. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

Microsoft® Access® 2013 Step by Step

Experience learning made easy—and quickly teach yourself how to build your own database with Access 2013. With Step by Step, you set the pace—building and practicing the skills you need, just when you them! Includes downloadable practice files and a companion eBook. Build a database from scratch or ready templates Create easy-to-use data-entry forms Write queries to extract and manipulate data Design reports to summarize data in effective ways Import data from other databases and documents

Microsoft® SQL Server® 2012 Step by Step

Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012 Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing exercises for building database solutions that solve real-world business problems. Discover how to: Install and work with core components and tools Create tables and index structures Manipulate and retrieve data Secure, manage, back up, and recover databases Apply techniques for building high-performing applications Use clustering, database mirroring, and log shipping

Database Design for Mere Mortals®: A Hands-on Guide to Relational Database Design, Third Edition

The #1 Easy, Commonsense Guide to Database Design! Michael J. Hernandez’s best-selling Database Design for Mere Mortals® has earned worldwide respect as the clearest, simplest way to learn relational database design. Now, he’s made this hands-on, software-independent tutorial even easier, while ensuring that his design methodology is still relevant to the latest databases, applications, and best practices. Step by step, shows you how to design databases that are soundly structured, reliable, and flexible, even in modern web applications. Hernandez guides you through everything from database planning to defining tables, fields, keys, table relationships, business rules, and views. You’ll learn practical ways to improve data integrity, how to avoid common mistakes, and when to break the rules. Database Design for Mere Mortals ® , Third Edition, Coverage includes Understanding database types, models, and design terminology Discovering what good database design can do for you—and why bad design can make your life miserable Setting objectives for your database, and transforming those objectives into real designs Analyzing a current database so you can identify ways to improve it Establishing table structures and relationships, assigning primary keys, setting field specifications, and setting up views Ensuring the appropriate level of data integrity for each application Identifying and establishing business rules Whatever relational database systems you use, Hernandez will help you design databases that are robust and trustworthy. Never designed a database before? Settling for inadequate generic designs? Running existing databases that need improvement? Start here.

IBM System Storage DS8000 Copy Services for Open Systems

In today’s highly competitive and real-time environment, the ability to manage all IT operations on a continuous basis makes the creation of copies and backups of data a core requirement for any IT deployment. Furthermore, it is necessary to provide proactive efficient disaster recovery strategies that can ensure continuous data availability for business operations. The Copy Services functions available with the IBM® System Storage® DS8000® are part of these strategies. This IBM Redbooks® publication helps you plan, install, configure, and manage the Copy Services functions of the DS8000 when they are used in Open System and IBM i environments. This book provides the details necessary to implement and control each of the Copy Services functions. Numerous examples illustrate how to use the various interfaces with each of the Copy Services. This book also covers the 3-site Metro/Global Mirror with Incremental Resync feature and introduces the IBM Tivoli® Storage Productivity Center for Replication solution. This book should be read with The IBM System Storage DS8000 Series: Architecture and Implementation, SG24-8886. There is also a companion book, IBM System Storage DS8000 Copy Services for IBM System z®, SG24-6787, which supports the configuration of the Copy Services functions in IBM z/OS® environments.

IBM Parallel Environment (PE) Developer Edition

This publication helps strengthen the position of IBM® software solutions and enables for High Performance Computing (hardware, software, and tools) with a well-defined and documented deployment model within an IBM environment. As a result, customers receive a planned foundation for dynamic infrastructure for parallel High Performance Computing (HPC) applications. This IBM Redbooks® publication addresses topics to take advantage of the strengths of IBM PE Developers Edition for HPC applications. The objective is to solve customer's challenges and maximize systems' throughput, performance, and management. This publication examines the tools, utilities, documentation, and other resources available to help the IBM technical teams provide solutions and support for IBM HPC solutions in an IBM hardware environment. This IBM Redbooks is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing HPC solutions and support.

Perception and Imaging, 4th Edition

How do you experience a photograph? What do you want a viewer to feel when they look at your image? Perception and Imaging explains how we see and what we don't see. Relevant psychological principles will help you predict your viewer's emotional reaction to your photographic images, giving you more power, control, and tools for communicating your desired message. Knowing how our minds work helps photographers, graphic designers, videographers, animators, and visual communicators both create and critique sophisticated works of visual art. Benefit from this insight in your work. Topics covered in this book: gestalt grouping, memory and association, space, time, color, contours, illusion and ambiguity, morphics, personality, subliminals, critiquing photographs, and rhetoric.

IBM System Storage DS8000 Copy Services for IBM System z

In today’s highly competitive and real-time environment, the ability to manage all IT operations on a continuous basis makes the creation of copies and backups of data a core requirement for any IT deployment. Furthermore, it is necessary to provide proactive efficient disaster recovery strategies that can ensure continuous data availability for business operations. The Copy Services functions available with the IBM® System Storage® DS8000® are part of these strategies. This IBM Redbooks® publication helps you plan, install, configure, and manage the Copy Services functions of the DS8000 when they are used in Open System and IBM i environments. This book provides the details necessary to implement and control each of the Copy Services functions. Numerous examples illustrate how to use the various interfaces with each of the Copy Services. This book also covers the 3-site Metro/Global Mirror with Incremental Resync feature and introduces the IBM Tivoli® Storage Productivity Center for Replication solution. This book should be read with The IBM System Storage DS8000 Series: Architecture and Implementation, SG24-8886. There is also a companion book, IBM System Storage DS8000 Copy Services for IBM System z, SG24-6787, which supports the configuration of the Copy Services functions in IBM z/OS® environments.

IBM System Storage DS8000: Host Attachment and Interoperability

This IBM® Redbooks® publication addresses host attachment and interoperability considerations for the IBM System Storage® DS8000® series. Within this book, you can find information about the most popular host operating systems platforms, including Windows®, IBM AIX®, VIOS, Linux®, Solaris, HP-UX, VMware, Apple, and IBM z/OS® The topics covered in this book target administrators or other technical personnel with a working knowledge of storage systems and a general understanding of open systems. You can use this book as guidance when installing, attaching, and configuring System Storage DS8000. The practical, usage-oriented guidance provided in this book complements the IBM System Storage DS8000 Host Systems Attachment Guide, SC26-7917.

Cyberethics: Morality and Law in Cyberspace, 5th Edition

The Internet and widespread use of blogging, email, social media and e-commerce have foregrounded new, complex moral issues and dilemmas. Likewise, modern technologies and social networks have brought numerous challenges to legal systems, which have difficulty keeping up with borderless global information technologies. The fully revised and updated Fifth Edition of Cyberethics: Morality and Law in Cyberspace offers an in-depth and comprehensive examination of the social costs and moral issues emerging from ever-expanding use of the Internet and new information technologies. Focusing heavily on content control, free speech, intellectual property, and security, Cyberethics: Morality and Law in Cyberspace provides legal and philosophical discussions of these critical issues.

The updated Fifth Edition includes new sections on Floridi’s Macroethics, gatekeepers and search engines, censorship, anti-piracy legislation, patents, and smartphones. Real-life case studies, including all-new examples focusing on Google, Facebook, video games, reader’s rights, and the Lulz Sec Hackers, provide real-world context. Ideal for undergraduate computer ethics courses as well as a general readership, Cyberethics is an excellent resource for students and laypeople alike.

Key Features: •Additional and revised content on P2P networks, hacktivists, cybercrime, a user's ability to control and monitor cookies in IE, mobilization data, online surveillance, threats posed by social networking, invasive commercial initiatives, Wikileaks, and more. •Examines the threat of the Internet on our privacy as consumers and employees, with a focus on covert information gathering, the use of "Cookies" and spyware. •End-of-chapter questions and case studies encourage critical thinking •Discusses the common ethical and public policy problems that have arisen and how technology or law would propose to solve these issues •Provides an unbiased review of Internet governance regulations

Computation and Storage in the Cloud

Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications

Developing with Couchbase Server

Today’s highly interactive websites pose a challenge for traditional SQL databases—the ability to scale rapidly and serve loads of concurrent users. With this concise guide, you’ll learn how to build web applications on top of Couchbase Server 2.0, a NoSQL database that can handle websites and social media where hundreds of thousands of users read and write large volumes of information. Using food recipe information as examples, this book demonstrates how to take advantage of Couchbase’s document-oriented database design, and how to store and query data with various CRUD operations. Discover why Couchbase is better than SQL databases with memcached tiers for managing data from the most interactive portions of your application. Learn about Couchbase Server’s cluster-based architecture and how it differs from SQL databases Choose a client library for Java, .NET, Ruby, Python, PHP, or C, and connect to a cluster Structure data in a variety of formats, from serialized objects, a stream of raw bytes, or as JSON documents Learn core storage and retrieval methods, including document IDs, expiry times, and concurrent updates Create views with map/reduce and learn Couchbase mechanisms for querying and selection

Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today. This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.

Oracle Exadata Recipes: A Problem-Solution Approach

Oracle Exadata Recipes takes an example-based, problem/solution approach in showing how to size, install, configure, manage, monitor, optimize, and migrate Oracle database workloads on and to the Oracle Exadata Database Machine. Whether you're an Oracle Database administrator, Unix/Linux administrator, storage administrator, network administrator, or Oracle developer, Oracle Exadata Recipes provides effective and proven solutions to accomplish a wide variety of tasks on the Exadata Database Machine. You can feel confident using the reliable solutions that are demonstrated in this book in your enterprise Exadata environment. Managing Oracle Exadata is unlike managing a traditional Oracle database. Oracle's Exadata Database Machine is a pre-configured engineered system comprised of hardware and software, built to deliver extreme performance for Oracle Database workloads. Exadata delivers extreme performance by offering an optimally balanced hardware infrastructure with fast components at each layer of the engineered technology stack, as well as a unique set of Oracle software features designed to leverage the high-performing hardware infrastructure by reducing I/O demands. Let Oracle Exadata Recipes help you translate your existing Oracle Database knowledge into the exciting new growth area that is Oracle Exadata. Helps extend your Oracle Database skillset to the fast-growing, Exadata platform Presents information on managing Exadata in a helpful, example-based format Clearly explains unique Exadata software and hardware features What you'll learn Install and configure Exadata Manage your Exadata hardware infrastructure Monitor and troubleshoot performance issues Manage smart scan and cell offload processing Take advantage of Hybrid Columnar Compression Deploy Smart Flash Cache and Smart Flash Logging Ensure the health of your Exadata environment Who this book is for Oracle Exadata Recipes is for Oracle Database administrators, Unix/Linux administrators, storage administrators, backup administrators, network administrators, and Oracle developers who want to quickly learn to develop effective and proven solutions without reading through a lengthy manual scrubbing for techniques. Readers in a hurry will appreciate the recipe format that sets up solutions to common tasks as the centerpiece of the book.

Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms. The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read. Illustrates linguistic, correlative, and network analysis of OSINT Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression Shows activists fighting against oppressive regimes how they can protect their identities online If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.

Creating Value-Based Archiving Solutions with IBM Content Collector

This IBM® Redbooks® publication describes how the IBM Content Collector family of products can help companies to create value-based archiving solutions. IBM Content Collector provides enterprise-wide content archiving and retention management capabilities. It also provides IT administrators with a high level of control over the archiving environment. From a common interface, organizations can implement policies that define what gets archived from which source system, make decisions about how content gets archived based on the content or metadata of the information, and determine the retention and governance rules associated with that type of content. Content Collector enables IT staff to implement granular archiving policies to collect and archive specific pieces of information. IBM Content Collector helps with the following tasks: Eliminating point solutions and lowering costs with a unified collection, management, and governance approach that works effectively across a broad range of source systems and information types Appraising, improving understanding of, culling, and properly selecting the information to archive Retaining, holding, and disposing of archived content efficiently and defensibly Eliminating the costs and risks inherent with over-retention This book covers the basic concepts of the IBM Content Collector product family. It presents an overview explaining how it provides value-based archiving and a defensible disposal capability in the archiving solutions. With the integration of IBM Content Classification and IBM Enterprise Records, the book also explains and showcases how these products can be used to add more flexibility, power, and capabilities to archiving solutions. The book is intended for IT architects and solution designers who need to understand and use IBM Content Collector for archiving solution implementations. Use cases are included to provide specific, step-by-step details about implementing common solutions that fulfill some of the general business requirements.