talk-data.com talk-data.com

Topic

data-engineering

3395

tagged

Activity Trend

1 peak/qtr
2020-Q1 2026-Q1

Activities

3395 activities · Newest first

IBM Software for SAP Solutions

SAP is a market leader in enterprise business application software. SAP solutions provide a rich set of composable application modules, and configurable functional capabilities that are expected from a comprehensive enterprise business application software suite. In most cases, companies that adopt SAP software remain heterogeneous enterprises running both SAP and non-SAP systems to support their business processes. Regardless of the specific scenario, in heterogeneous enterprises most SAP implementations must be integrated with a variety of non-SAP enterprise systems: Portals Messaging infrastructure Business process management (BPM) tools Enterprise Content Management (ECM) methods and tools Business analytics (BA) and business intelligence (BI) technologies Security Systems of record Systems of engagement When SAP software is used in a large, heterogeneous enterprise environment, SAP clients face the dilemma of selecting the correct set of tools and platforms to implement SAP functionality, and to integrate the SAP solutions with non-SAP systems. This IBM® Redbooks® publication explains the value of integrating IBM software with SAP solutions. It describes how to enhance and extend pre-built capabilities in SAP software with best-in-class IBM enterprise software, enabling clients to maximize return on investment (ROI) in their SAP investment and achieve a balanced enterprise architecture approach. This book describes IBM Reference Architecture for SAP, a prescriptive blueprint for using IBM software in SAP solutions. The reference architecture is focused on defining the use of IBM software with SAP, and is not intended to address the internal aspects of SAP components. The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. However, there are several other architectural domains which are not included in the book. This is not to imply that these other architectural domains are not important or are less important, or that IBM does not offer a solution to address them. It is only reflective of time constraints, available resources, and the complexity of assembling a book on an extremely broad topic. Although more content could have been added, the authors feel confident that the scope of architectural material that has been included should provide organizations with a fantastic head start in defining their own enterprise reference architecture for many of the important architectural domains, and it is hoped that this book provides great value to those reading it. This IBM Redbooks publication is targeted to the following audiences: Client decision makers and solution architects leading enterprise transformation projects and wanting to gain further insight so that they can benefit from the integration of IBM software in large-scale SAP projects. IT architects and consultants integrating IBM technology with SAP solutions.

The Basics of Financial Modeling

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly proficient at building an accurate and effective financial model from the ground up. In his short book, The Basics of Financial Modeling—an abridgement of his Handbook of Financial Modeling—Jack Avon equips financial professionals with a quick overview of the tools they need to monitor a company's assets and project its future performance and prospects for specific initiatives. Based on the author's extensive experience building models in business and finance—and teaching others to do the same— The Basics of Financial Modeling takes readers step by step in a quick-read format through the financial modeling process, starting with a general overview of the history and evolution of financial modeling. It then moves on to more technical topics, such as the principles of financial modeling and the proper way to approach a financial modeling assignment, before covering key application areas for modeling in Microsoft Excel. Designed for beginning to intermediate modelers who wish to expand and enhance their knowledge of using Excel to build financial models, The Basics of Financial Modeling covers: The accounting and finance concepts that underpin working financial models How to approach financial issues and solutions from a modeler's perspective The importance of thinking about end users when developing a financial model How to plan, design, and build a financial model A nuts-to-bolts guide to solving common financial problems with spreadsheets, The Basics of Financial Modeling is a one-stop resource for anyone who needs to build or analyze financial models.

IBM XIV Storage System Business Continuity Functions

The IBM XIV® Storage System has a rich set of copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and online backup solutions. These functions allow point-in-time copies, known as snapshots and full volume copies, and also include remote copy capabilities in either synchronous or asynchronous mode. A three-site mirroring function is now available to further improve availability and disaster recovery capabilities. These functions are included in the XIV software and all their features are available at no extra charge. The various copy functions are reviewed in separate chapters, which include detailed information about usage and practical illustrations. The book also illustrates the use of IBM® Tivoli® Storage Productivity Center for Replication to manage XIV Copy Services. This IBM Redbooks® publication is intended for anyone who needs a detailed and practical understanding of the XIV copy functions.

Hbase Essentials

Hbase Essentials provides a hands-on introduction to HBase, a distributed database built on top of the Hadoop ecosystem. Through practical examples and clear explanations, you will learn how to set up, use, and administer HBase to manage high-volume, high-velocity data efficiently. What this Book will help me do Understand the importance and use cases of HBase for managing Big Data. Successfully set up and configure an HBase cluster in your environment. Develop data models in HBase and perform CRUD operations effectively. Learn advanced HBase features like counters, coprocessors, and integration with MapReduce. Master cluster management and performance tuning for optimal HBase operations. Author(s) None Garg is a seasoned Big Data engineer with extensive experience in distributed databases and the Hadoop ecosystem. Having worked on complex data systems, None brings practical insights to understanding and implementing HBase. Known for a clear and approachable writing style, None aims to make learning technical subjects accessible. Who is it for? Hbase Essentials is ideal for developers and Big Data engineers keen to build expertise in distributed databases. If you have a basic understanding of HDFS or MapReduce or have experience with NoSQL databases, this book will accelerate your knowledge of HBase. It's tailored for those seeking to leverage HBase for scalable and reliable data solutions. Whether you're starting with HBase or expanding your Big Data skillset, this guide provides the tools to succeed.

Oracle Database 12c PL/SQL Advanced Programming Techniques

Take Your PL/SQL Programming Skills to the Next Level Build robust database-centric PL/SQL applications quickly and effectively. Oracle Database 12c PL/SQL Advanced Programming Techniques shows you how to write and deploy Java libraries inside Oracle Database 12c, use the utl_file and DBMS_SCHEDULER packages, and create external tables and external procedures. Application security, performance tuning, and Oracle Database In-Memory are also covered in this Oracle Press guide. Configure, deploy, and troubleshoot Java libraries for Oracle object types Use the utl_file package to manage unstructured and structured data Develop and deploy Java I/O libraries and wrap them with PL/SQL Create and use external tables Implement high-speed data transfer Harden database systems and develop secure applications Manage complex schedules and jobs with the DBMS_SCHEDULER package Optimize PL/SQL for use in performance tuning Create and deploy external procedures Implement the Oracle Database In-Memory column store feature

Cybervetting, 2nd Edition

The Snowden intelligence leak and the recent Navy Yard shooting have cast a bright light on what employers and background companies do to vet their employees. This edition includes new information providing the latest tactics and guidelines for proper use of Internet vetting, investigations, and open-source intelligence on the Internet. It outlines new tools and tactics to legally comb the Internet for information on individuals when screening current and prospective employees, and includes outcomes of recent legal cases relating to discoverable information on social media.

Expert Oracle Database Architecture, Third Edition

" Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple philosophy: "you can treat Oracle as a black box and just stick data into it, or you can understand how it works and exploit it as a powerful computing environment." If you choose the latter, then you’ll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised third edition covers the developments up to Oracle Database 12 c. Significant new content is included surrounding Oracle's new cloud feature set, and especially the use of pluggable databases. Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it. Don’t treat Oracle Database as a black-box. Get this book. Get under the hood. Turbo-charge your career. Revised to cover Oracle Database 12 c Proof-by-example approach: Let the evidence be your guide Dives deeply into Oracle Database’s most powerful features"

IBM XIV Storage System Architecture and Implementation

This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5 of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.

Oracle Database Transactions and Locking Revealed

Oracle Database Transactions and Locking Revealed provides much-needed information for building scalable, high-concurrency applications and deploy them against the Oracle Database. Read this short, 150-page book that is adapted from Expert Oracle Database Architecture to gain a solid and accurate understanding of how locking and concurrency are dealt with by Oracle Database. Also learn how the Oracle Database architecture accommodates user transactions, and how you can write code to mesh with how Oracle Database is designed to operate. Good transaction design is an important facet of highly-concurrent applications that are run by hundreds, even thousands of users who are all executing transactions at the same time. Transaction design in turn relies upon a good understanding of how the underlying database platform manages of the locking of resources so as to prevent access conflicts and data loss that might otherwise result from concurrent access to data in the database. Oracle Database Transactions and Locking Revealed covers in detail the various lock types, and also different locking schemes such as pessimistic and optimistic locking. Then you'll learn about transaction isolation and multiversion concurrency, and how the various lock types support Oracle Databases transactional features. You'll learn some good tips for transaction design, as well as some bad practices and habits to avoid. Coverage is also given to redo and undo, and their role in concurrency. This is an important book that anyone developing highly-concurrent applications will want to have handy on their shelf.

Oracle RMAN for Absolute Beginners

Oracle RMAN for Absolute Beginners is a gentle introduction to the use of Oracle's Recovery Manager software to make backups of an Oracle database, and to restore all or part of a database in the event that data loss occurs. It is often said that a database administrator's #1 job responsibility is to be able to recover from data loss. If you're new to the Oracle platform, or you're new to database administration in general, you can hardly go wrong by making it your first priority to learn to backup and recover the database that has been entrusted into your hands. This book is short and sweet at just 200 pages. Focus lies on the mainstream use cases. Recovery Manager, or RMAN as it is called, is a powerful and complex tool that can be intimidating at first. Author Darl Kuhn understands the need to focus on the core use cases, building your confidence in the tool, and in your ability to recover from lost database files, and even to recover your entire database should that become necessary. Oracle RMAN for Absolute Beginners shows how to backup your database. That's the first job. You'll learn to backup the entire database, and to create incremental backups that in turn can speed restore and recovery operations. Then you'll learn to recover from lost data files, lost redo log files, lost control files, and even to restore the entire database from scratch. You'll even learn how to clone a database for development and test purposes by backing the database up on one system and restoring it onto another. Author Darl Kuhn has a decade and a half of experience in writing about, and teaching Oracle Database backup and recovery. If you are newly responsible for an Oracle Database, you can hardly do better than to pick up a copy of Oracle RMAN for Absolute Beginners.

ArcGIS Web Development

ArcGIS Web Development is an example-rich tutorial designed to teach developers to use the ArcGIS JavaScript API to build custom GIS web applications. About the Technology Now you can unshackle your GIS application from a workstation! Using the ArcGIS JavaScript API, developers can build mobile and web-based maps and applications driven by ArcGIS data and functionality. Experienced ArcGIS developers will find that the familiar development environment provides a smooth transition to the web. Web developers new to GIS will be pleased by how easily they can apply their existing skills to GIS applications. About the Book ArcGIS Web Development is an example-rich guide that teaches you to use the ArcGIS JavaScript API to build custom GIS web applications. The book begins with easy-to-follow examples that introduce readers to the ArcGIS JavaScript API and show how you can apply simple customizations. As the book progresses, you'll explore a full-scale, web-mapping application. By the end you will be able to build web apps that have features you'd ordinarily expect to find only in dedicated GIS applications. What's Inside Build web-based GIS applications Customize the ArcGIS Javascript API tools Bring ArcGIS data to the web Create secure logins for mobile app users About the Reader Written for web developers familiar with JavaScript and basic GIS concepts. Experience with ArcGIS is helpful, but not necessary. About the Author Rene Rubalcava is the cofounder of SmartGeoTech, Inc., a GIS development company specializing in Esri technologies. Quotes The most succinct tutorial for using the ArcGIS JavaScript API. - Shaun Langley, Urban GIS Everything you need to build location and mapping web applications with ArcGIS. - Dennis Sellinger, Géotech, France Anyone getting started with the ArcGIS API for JavaScript should pick up this book. - Brian Arnold, Bazaarvoice, Inc. The author is thorough, and the pace is just right. - Jacqueline Wilson, Avon Grove Charter School

Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Message Queuing Telemetry Transport (MQTT) is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.

SAP ABAP: Hands-On Test Projects with Business Scenarios

" SAP ABAP (Advanced Business Application Programming) elucidates the numerous features of the core programming platform, which is used for development for the entire SAP software suite. SAP ABAP uses numerous hands on business oriented use cases and a valuable dedicated e-resource to demonstrate the underlying advanced concepts of the OO ABAP environment and the SAP UI. SAP ABAP covers the latest version (NetWeaver 7.3 and SAP application programming release 6.0) of the platform for demonstrating the customization and implementation phases of the SAP software implementation. Shorn of weighty theoretical treatment and preoccupation with language syntax, SAP ABAP is a comprehensive, practical one stop solution,which demonstrates and conveys the language’s commands and features through hands on examples. The accompanying e-resource is a take off point to the book. SAP ABAP works in tandem with the accompanying e-resource to create an interactive learning environment where the book provides a brief description and an overview of a specified feature/command followed by the user switching over to the accompanying e-resource, where a step-by-step guide to creating and running the feature’s object is available. The presentation of the features is scenario oriented, i.e. most of the features are demonstrated in terms of small business scenarios. The e-resource contains the scenario descriptions, screen shots, detailed screen cams and ABAP program source to enable the reader to create all objects related to the scenario and run/execute them. The underlying concepts of a feature/command are conveyed through execution of these hands-on programs. Further exercises to be performed independently by the reader are also proposed. The demonstration/illustration objects including the programs rely on some of the SAP application tables being populated, for example an IDES system which is now a de facto system for all SAP training related activities. "

IBM Linear Tape File System Enterprise Edition V1.1.1.1 Installation and Configuration Guide

This IBM® Redbooks® publication helps you with planning, installation, and configuration of the new IBM Linear Tape File System™ (LTFS) Enterprise Edition (EE) V1.1.1.1 for the IBM System Storage® TS3500 and TS4500 Tape Libraries. LTFS EE is designed to enable the use of LTFS for the policy management of tape as a storage tier in an IBM General Parallel File System (IBM GPFS™)-based environment and helps encourage the use of tape as a critical tier in the storage environment. LTFS EE can run any application that is designed for disk files on tape. LTFS EE supports IBM Linear Tape-Open (LTO) Ultrium 6 and 5 tape drives, and IBM System Storage TS1140 Tape Drives that are installed in TS3500 tape libraries. LTFS EE can play a major role in reducing the cost of storage for data that does not need the access performance of primary disk. The use of LTFS EE to replace disks with tape in Tier 2 and Tier 3 storage can improve data access over other storage solutions because it improves efficiency and streamlines management for files on tape. LTFS EE simplifies the use of tape by making it transparent to the user and manageable by the administrator under a single infrastructure. This publication is intended for anyone who wants to understand more about LTFS EE planning and implementation. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

Oracle Enterprise Manager 12c Command-Line Interface

Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targets Quickly create administrator accounts that are fully-configured with pre-expired passwords and all needed roles Invoke batch files to execute sequences of related commands with consistency against multiple targets Batch create large groups of user logins with a single command and more! The Enterprise Manager Command Line Interface (EM CLI) is the administrator's key to unlocking the power of Enterprise Manager 12c (EM12c) with scalability, repeatability, and confidence. In previous versions, most administrators ventured into the command-line interface only with the assistance of Oracle Support. But now there are many features in EM12c that are accessible only from the command-line. This is far from a disadvantage! Enterprise Manager is now a powerful tool for automation in the hands of a skilled database administrator. Enterprise Manager scripting offers potential for all administrators who manage Oracle’s enterprise-level products in their environment. You can automate from the smallest, single-instance configuration all the way up to a broadly distributed enterprise-level rollout having database instances strewn across broad geographical distributions. The power of the EM CLI returns the administrator to the golden age, where the entire environment, from database to application to infrastructure, can often be managed from this powerful command line tool secured by the robust Enterprise Manager framework. Brings a golden-age of automation to Oracle Database administrators Provides ready-made scripts contributed by leading members of the community Covers advanced techniques involving Jython and Python

Search: How the Data Explosion Makes Us Smarter

Search is as old as language. We've always needed to find something in the jumble of human creation. The first web was nothing more than passing verbal histories down the generations so others could find and remember how not to get eaten; the first search used the power of written language to build simple indexes in printed books, leading to the Dewey Decimal system and reverse indices in more modern times. Then digital happened. Besides having profound societal impacts, it also made the act of searching almost impossibly complex for both engines and searchers. Information isn’t just words; it is pictures, videos, thoughts tagged with geocode data, routes, physical world data, and, increasingly, the machines themselves reporting their condition and listening to others’. Search: How the Data Explosion Makes Us Smarter, the first in the Insight Labs Library, holds up a mirror to our time to see if search can keep up. Author Stefan Weitz explores the idea of access to help readers understand how we are inventing new ways to search and access data through devices in more places and with more capabilities. We are at the cusp of imbuing our generation with superpowers, but only if we fundamentally rethink what search is, how people can use it, and what we should demand of it.

Data Fluency: Empowering Your Organization with Effective Data Communication

A dream come true for those looking to improve their data fluency Analytical data is a powerful tool for growing companies, but what good is it if it hides in the shadows? Bring your data to the forefront with effective visualization and communication approaches, and let Data Fluency: Empowering Your Organization with Effective Communication show you the best tools and strategies for getting the job done right. Learn the best practices of data presentation and the ways that reporting and dashboards can help organizations effectively gauge performance, identify areas for improvement, and communicate results. Topics covered in the book include data reporting and communication, audience and user needs, data presentation tools, layout and styling, and common design failures. Those responsible for analytics, reporting, or BI implementation will find a refreshing take on data and visualization in this resource, as will report, data visualization, and dashboard designers. Conquer the challenge of making valuable data approachable and easy to understand Develop unique skills required to shape data to the needs of different audiences Full color book links to bonus content at juiceanalytics.com Written by well-known and highly esteemed authors in the data presentation community Data Fluency: Empowering Your Organization with Effective Communication focuses on user experience, making reports approachable, and presenting data in a compelling, inspiring way. The book helps to dissolve the disconnect between your data and those who might use it and can help make an impact on the people who are most affected by data. Use Data Fluency today to develop the skills necessary to turn data into effective displays for decision-making.

Understanding Large Temporal Networks and Spatial Networks: Exploration, Pattern Searching, Visualization and Network Evolution

This book explores social mechanisms that drive network change and link them to computationally sound models of changing structure to detect patterns. This text identifies the social processes generating these networks and how networks have evolved.

IBM PowerHA SystemMirror for AIX Cookbook

This IBM® Redbooks® publication can help you install, tailor, and configure the new IBM PowerHA® Version 7.1.3, and understand new and improved features such as migrations, cluster administration, and advanced topics like configuring in a virtualized environment including workload partitions (WPARs). With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you. This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience. This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.

10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Donts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. Its a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Donts cant do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Donts employs personal anecdotes and major news stories to illustrate what canand all too often doeshappen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Donts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Dont. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Donts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you dont get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physicalin short, so that you dont trust anyone overanything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.