talk-data.com talk-data.com

Topic

data

3406

tagged

Activity Trend

3 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Hibernate Search in Action

Hibernate Search in Action is a practical, example-oriented guide for Java developers with some background in Hibernate Core. As the first book to cover Hibernate Search, it guides you through every step to set up full text search functionality in your Java applications. The book also introduces core search techniques and reviews the relevant parts of Lucene, in particular the query capabilities. Hibernate Search in Action also provides a pragmatic, how-to exploration of more advanced topics such as Search clustering. For anyone using Hibernate or JBoss Seam, this book is the definitive guide on how to add or enhance search features in their applications. About the Technology Good search capability is one of the primary demands of a business application. Engines like Lucene provide a great starting point, but with complex applications it can be tricky to implement. It's tough to keep the index up to date, deal with the mismatch between the index structure and the domain model, handle querying conflicts, and so on. Hibernate Search is an enterprise search tool based on Hibernate Core and Apache Lucene. It provides full text search capabilities for Hibernate-based applications without the infrastructural code required by other search engines. With this free, open-source technology, you can quickly add high-powered search features in an intelligent, maintainable way. About the Book What's Inside About the Reader About the Author Emmanuel Bernard: After graduating from Supelec (French "Grande Ecole"), Emmanuel has spent a few years in the retail industry where he started to be involved in the ORM space and in full text technology. He joined the Hibernate team in 2003 and is now a lead developer at JBoss, a division of Red Hat. Emmanuel is the lead developer of Hibernate Annotations and Hibernate EntityManager, two key projects on top of Hibernate core implementing the Java Persistence(tm) specification. He has also lead the Hibernate Search project from its inception, reconsiling the two fields Emmanuel has been involved in: ORM and Full Text search. He is a regular speaker at various conferences and JUGs, including JavaOne, JBoss World and Javapolis (Javoxx). He is also involved in the Java Community Process as a specification lead for JSR 303 (Bean Validation) and as a expert group member for JSR 317 (Java Persistence 2.0). John Griffin has been in the software and computer industry in one form or another since 1969. He remembers writing his first FORTRAN IV program on his way back from Woodstock. Currently, he is the software engineer/architect for SOS Staffing Services, Inc. He was formerly the lead e-commerce architect for Iomega Corporation, lead SOA architect for Realm Systems and an independent consultant for the Dept of the Interior among many other callings. John has even spent time as an adjunct university professor. He enjoys being a committer to projects because he believes it's time to get involved and give back to the community. John is the author of XML and SQL Server 2000 published by New Riders Press. He is a member of the ACM. Currently, he resides in Layton, Utah with wife, Judy and Australian Shepherds, Clancy and Molly. Quotes A great resource for true database independent full text search. - Aaron Walker, base2Services It has completely changed the way I do complex search. Awesome! - Ayenda Rahien, Author of Building Domain Specific Languages in Boo Love its vast coverage--the definitive source. - Patrick Dennis, Management Dynamics Incs. Covers it all...the only source I need. - Robert Hanson, Author of GWT in Action A superb discussion of a complex topic. - Spencer Stejskal, SOS Staffing Services

Business Modeling

As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly. Provides in-depth coverage of the four business modeling disciplines: process modeling, motivation modeling, organization modeling, and rules modeling Offers guidance on how to work effectively with subject matter experts and how to run business modeling workshops Details today's best practices for building effective business models, and describes common mistakes that should be avoided Describes standards for each business modeling discipline Explains how to analyze, simulate, and deploy business models Includes examples both from the authors' work with clients and from a single running example that spans the book

SQL Server Forensic Analysis

“What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities.” —Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler’s techniques as he guides you through a real-world investigation from start to finish. SQL Server Forensic Analysis, The techniques described in can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. SQL Server Forensic Analysis Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you’re a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you’ll find this book an indispensable resource. SQL Server Forensic Analysis

Microsoft® SQL Server™ 2008 Analysis Services Unleashed

As the foundation of the Microsoft Business Intelligence Strategy, Microsoft SQL Server 2008 Analysis Services provides users with faster access to data and even more tools for managing and analyzing data across multidimensional objects (databases, dimensions, cubes). Microsoft SQL Server 2008 Analysis Services Unleashed is the ultimate guide for anyone who is planning to use the latest version of Analysis Services. It gives readers insight into the way Analysis Services functions, and explains practical methods for designing and creating multidimensional objects. It also provides valuable insight into the reasons behind the design decisions taken by the product development team. The authors have been involved with Analysis Services from its earliest days. They have documented in detail the internal features of Analysis Services 2008, explaining server architecture, main data structures, data processing, and query resolution algorithms. Discover the new functionality introduced in Analysis Services 2008 including MDX enhancements and new DMV (dynamic memory views) Work with the Business Intelligence Development Studio, the new Dimension Editor, and Aggregation Designer interfaces Enjoy complete coverage of new Shared Scalable Databases scale-out infrastructure Learn the key concepts of multidimensional modeling Explore the multidimensional object model and its definition language Integrate multidimensional and relational databases Build client applications to access data in Analysis Services Unravel the inner workings of the server architecture, including main data structures, data processing, and query resolution algorithms Learn the main concepts of the MDX language and gain an in-depth understanding of advanced MDX concepts Gain a deeper understanding of the internal and external protocols for data transfer, including the XML/A protocol Discover how Analysis Services manages memory Explore the security model, including role-based security, code-access security, and data security Category: Microsoft SQL Server Covers: Microsoft SQL Server 2008 Analysis Services User Level: Intermediate-Advanced $59.99 USA / $65.99 CAN / £38.99 Net UK±

XML: Visual QuickStart Guide, Second Edition

What is XML? XML, or eXtensible Markup Language, is a specification for storing information. It is also a specification for describing the structure of that information. And while XML is a markup language (just like HTML), XML has no tags of its own. It allows the person writing the XML to create whatever tags they need. The only condition is that these newly created tags adhere to the rules of the XML specification. In the seven years since the first edition of “XML: Visual QuickStart Guide” was published, XML has taken its place next to HTML as a foundational language on the Internet. XML has become a very popular method for storing data and the most popular method for transmitting data between all sorts of systems and applications. The reason being, where HTML was designed to display information, XML was designed to manage it. This book begins by showing you the basics of the XML language. Then, by building on that knowledge, additional and supporting languages and systems will be discussed. To get the most out of this book, you should be somewhat familiar with HTML, although you don’t need to be an expert coder by any stretch. No other previous knowledge is required. “XML: Visual QuickStart Guide, 2nd Edition” is divided into seven parts. Each part contains one or more chapters with step-by-step instructions that explain how to perform XML-related tasks. Wherever possible, examples of the concepts being discussed are displayed, and the parts of the examples on which to focus are highlighted. The order of the book is intentionally designed to be an introduction to the fundamentals of XML, followed by discussions of related XML technologies. • In Part 1 of the book, you will learn how to create an XML document. It’s relatively straightforward, and even more so if you know a little HTML. • Part 2 focuses on XSL, which is a set of languages designed to transform an XML document into something else: an HTML file, a PDF document, or another XML document. Remember, XML is designed to store and transport data, not display it. • Parts 3 and 4 of the book discuss DTD and XML Schema, languages designed to define the structure of an XML document. In conjunction with XML Namespaces (Part 5), you can guarantee that XML documents conform to a pre-defined structure, whether created by you or by someone else. • Part 6, Developments and Trends, details some of the up-and-coming XML-related languages, as well as a few new versions of existing languages. • Finally, Part 7 identifies some well-known uses of XML in the world today; some of which you may be surprised to learn. This beginner’s guide to XML is broken down as follows: • Introduction • Chapter 1: Writing XML • Part 2: XSL • Chapter 2: XSLT • Chapter 3: XPath Patterns and Expressions • Chapter 4: XPath Functions • Chapter 5: XSL-FO • Part 3: DTD • Chapter 6: Creating a DTD • Chapter 7: Entities and Notations in DTDs • Chapter 8: Validation and Using DTDs • Part 4: XML Schema • Chapter 9: XML Schema Basics • Chapter 10: Defining Simple Types • Chapter 11: Defining Complex Types • Part 5: Namespaces • Chapter 12: XML Namespaces • Chapter 13: Using XML Namespaces • Part 6: Recent W3C Recommendations • Chapter 14: XSLT 2.0 • Chapter 15: XPath 2.0 • Chapter 16: XQuery 1.0 • Part 7: XML in Practice • Chapter 17: Ajax, RSS, SOAP and More

Beginning T-SQL with Microsoft® SQL Server® 2005 and 2008

If you have never programmed with T-SQL but have some background programming knowledge and experience, Beginning T-SQL with Microsoft SQL Server 2005 and 2006 will provide you with an overview of SQL Server query operations and tools used with T-SQL, Microsoft's implementation of the SQL database query language. Review basic query language commands and syntax, learn how to design and build applications, and understand how to optimize query performance. Improve your skills with the most up-to-date T-SQL guide, which provides hands-on examples and instructions to guide you through the process.

Deployment Guide Series: IBM Tivoli Identity Manager 5.0

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.

Beginning Google Maps Mashups with Mapplets, KML, and GeoRSS: From Novice to Professional

Beginning Google Maps Mashups with Mapplets, KML, and GeoRSS is a beginner's guide to creating web mashups using Google mapping technology. Serves as a single–source primer to displaying data on Google Maps Covers both Mapplets and the Google Maps API Provides everything you need to start participating in the geographic Web What you'll learn "Mash up" GeoWeb services onto a Google map Package your mashup as a mapplet and publish it to maps.google.com Enhance your map with driving directions, local search, map advertising, and more Discover common Google–mapping mistakes to avoid Find out how and when to geocode existing data into mappable coordinates Deliver your own data as GeoXML Who this book is for This book is for web designers and developers who have not worked with Google Maps or geographic data before. A working knowledge of HTML is required, and some programming experience is beneficial.

Pro Sync Framework

The Sync Framework is Microsoft's innovation to address the dilemma of occasionally connected systems. It is a comprehensive synchronization platform that enables collaboration and offline access for applications, services, and devices. In particular, it features technologies and tools that enable device roaming, sharing, and the ability to take networked data offline before synchronizing it back to the networked application at a later time. Pro Sync Framework concludes with a working example that shows how the techniques you've learned can be used to create a versatile application, adaptable to a wide variety of connectivity and synchronization challenges.

SAP Security Configuration and Deployment

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP

Data Mining with Microsoft® SQL Server® 2008

Understand how to use the new features of Microsoft SQL Server 2008 for data mining by using the tools in Data Mining with Microsoft SQL Server 2008, which will show you how to use the SQL Server Data Mining Toolset with Office 2007 to mine and analyze data. Explore each of the major data mining algorithms, including naive bayes, decision trees, time series, clustering, association rules, and neural networks. Learn more about topics like mining OLAP databases, data mining with SQL Server Integration Services 2008, and using Microsoft data mining to solve business analysis problems.

Beginning SQL Server 2008 Express for Developers: From Novice to Professional

Beginning SQL Server 2008 Express for Developers: From Novice to Professional takes a developer, and even a database administrator, from knowing nothing about SQL Server 2008 Express Edition to being ready to design and build a fully functioning system that is secure, reliable, maintainable, and robust. The Express Edition of SQL Server is a free resource commonly used by students, developers of small systems, and those transferring skills from other databases. This book focuses on the features within the Express Edition and therefore will not confuse readers with coverage of features found only in the Development Edition. By the end of the book, readers will be ready to move on to Accelerated SQL Server 2008 as well as other books within the Apress SQL Server lineup such as Pro SQL Server 2008 Reporting Services. Covers using the free Express Edition of SQL Server Describes creating a database from scratch and builds on this Provides an understanding of SQL Server Express 2008, allowing you to build future solutions for you and your business

Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management

Control Intellectual Property, and Avoid Information Overload Glean actionable business information from your "digital landfill" by deploying a flexible, cost-effective content management framework across your entire organization. Transforming Infoglut!: A Pragmatic Strategy for Oracle Enterprise Content Management details, step-by-step, how to rein in the current data explosion and gain the competitive edge. Get tips for building an enterprise content management (ECM) team, centralizing storage, finding and managing information, incorporating legacy systems, and handling unstructured content. You'll also learn how to secure your system, optimize performance, and ensure regulatory compliance. Design and manage a dynamic Oracle ECM infrastructure Consolidate corporate data using Oracle Universal Content Management Implement a flexible, scalable, and extensible middleware layer Centralize storage with Oracle Universal Records Management Suite Encrypt and secure data enterprise-wide using Oracle Information Rights Management Integrate Oracle WebCenter Services and Oracle Secure Enterprise Search Enhance structured enterprise applications with unstructured content Extend ECM functionality using cutting-edge Enterprise 2.0 tools

Microsoft® SQL Server® 2008 Step by Step

Teach yourself SQL Server 2008—one step at a time. Get the practical guidance you need to build database solutions that solve real-world business problems. Learn to integrate SQL Server data in your applications, write queries, develop reports, and employ powerful business intelligence systems. Discover how to: Install and work with core components and tools Create tables and index structures Manipulate and retrieve data Secure, manage, back up, and recover databases Apply tuning plus optimization techniques to generate high-performing database applications Optimize availability through clustering, database mirroring, and log shipping Tap business intelligence tools—Reporting, Analysis, and Integration Services CD features: Practice exercises and code samples Fully searchable eBook For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Intelligent Mentoring: How IBM Creates Value through People, Knowledge, and Relationships

How to Use Mentoring to Drive Maximum Competitive Advantage Techniques and lessons from IBM’s world-class mentoring programs—for every business and HR leader, strategist, Chief Learning Officer, consultant, trainer, and scholar “A crucial part of my job is to help develop and retain the more than 200,000 members of IBM’s global technical community. Over the years, I have found that the true spirit of any organization is its people, and unique, world-class mentoring programs play a crucial role in their success. What I really like about Intelligent Mentoring is that it is not an academic treatise on the theory of mentoring, but a series of practical solutions that can be used by virtually any organization to gain productivity, increase retention, and improve bottom-line results.” — Nick Donofrio, Executive Vice President, Innovation and Technology, IBM Corporation “We have known about the importance of mentoring in developing people for decades. Yet few organizations have successfully leveraged it as part of their HR strategy. IBM is one of those companies. Intelligent Mentoring is about more than the mentoring initiative successfully implemented at IBM. It is a guide for how companies can leverage mentoring in a way that aligns with company strategy and supports organizational and individual development. It is a must-read for any executive considering a mentoring initiative as part of the firm’s HR strategy. IBM’s mentoring effort combined the best of what we know from mentoring research, career development theory, and change management to create a highly successful effort. There is much here for practitioners and scholars to learn.” — David A. Thomas, Ph.D., Naylor Fitzhugh Professor of Business Administration, Harvard Business School “Performance is the ultimate driver of this company. Even back in our earliest days, one of the keys to IBM’s greatness was performance, along with top-notch technology. Since arriving at IBM in 2000, my goal has been to identify, develop, train, reward, and retain high-performing people, and one of the best ways to support these high performers is through mentoring. I believe that Intelligent Mentoring has done a phenomenal job of capturing the innovative and varied mentoring initiatives that IBM has used over the years. The authors really take you inside the company and show how mentoring has helped IBM preserve its corporate culture by passing on knowledge, not only between generations, but in all directions throughout our global community. This book is a must-read for anyone who wants to use the powerful tool of mentoring to its best and most productive advantage, and I recommend it highly.” — Randy MacDonald, Senior Vice President, Human Resources, IBM Corporation For today’s enterprises, few challenges are as daunting as preparing tomorrow’s leaders. Mentoring is one of the most powerful tools at their disposal. But not all mentoring programs are equally effective, and not all companies have learned how to sustain mentoring. One company has: IBM. Intelligent Mentoring reveals how IBM has done it–and offers specific guidance and best practices you can use to achieve equally powerful results. Intelligent Mentoring shows how IBM has fully integrated a diverse portfolio of formal mentoring initiatives into both talent development and innovation promotion. Whether you’re a business leader, strategist, Chief Learning Officer, training specialist, coach, or consultant, this book presents a state-of-the-art framework for making mentoring work. Drawing on IBM’s experience, the authors demonstrate how to build a diverse portfolio of effective mentoring programs...use mentoring to strengthen organizational intelligence...build sustainable communities of mentors and mentees...promote collaboration across differences... and above all, link mentoring to strategy and use it to sustain competitive advantage. • Use mentoring to develop tomorrow’s world-class business leaders Actionable solutions and best practices from IBM’s breakthrough mentoring program • Embrace mentoring as a high-performance work practice Maximizing, capturing, and communicating the value-added impact of mentoring • Set the right goals for mentoring: then achieve them Utilize mentoring to strengthen organizational learning, improve retention, promote innovation, and more • Use mentoring to solve your organization’s most “wicked” problems How mentoring can help you respond to complex, tangled challenges you’ve never faced before

Beginning Database Design Solutions

This book is intended for IT professionals and students who want to learn how to design, analyze, and understand databases. The material will benefit those who want a better high-level understanding of databases such as proposal managers, architects, project managers, and even customers. The material will also benefit those who will actually design, build, and work with databases such as database designers, database administrators, and programmers. In many projects, these roles overlap so the same person may be responsible for working on the proposal, managing part of the project, and designing and creating the database. This book is aimed at IT professionals and students of all experience levels. It does not assume that you have any previous experience with databases or programs that use them. It doesn't even assume that you have experience with computers. All you really need is a willingness and desire to learn. This book explains database design. It tells how to plan a database's structure so the database will be robust, resistant to errors, and flexible enough to accommodate a reasonable amount of future change. It explains how to discover database requirements, build data models to study data needs, and refine those models to improve the database's effectiveness. The book solidifies these concepts by working through a detailed example that designs a realistic database. Later chapters explain how to actually build databases using two common database products: Access 2007 and MySQL. The book finishes by describing some of the topics you need to understand to keep a database running effectively such as database maintenance and security. This book explains database design. It tells how to determine what should go in a database and how the database should be structured to give the best results. This book does not focus on actually creating the database. The details of database construction are different for different database tools so, to remain as generally as useful as possible, this book doesn't concentrate on any particular database system. You can apply the techniques described here equally to whatever database tool you use whether it's Access, SQL Server, Oracle, MySQL, or some other database product. Most database products include free editions that you can use for smaller projects. For example, SQL Server Express Edition, Oracle Express Edition, and MySQL Community Server are all free. To remain database neutral, the book does not assume you are using a particular database so you don't need any particular software or hardware. To work through the Exercises, all you really need is a pencil and some paper. You are welcome to type solutions into your computer if you like but you may actually find working with pencil and paper easier than using a graphical design tool to draw pictures, at least until you are comfortable with database design and are ready to pick a computerized design tool. "Goals of Effective Database Design," explains the reasons why people and organizations use databases. It explains a database's purpose and conditions that it must satisfy to be useful. This also describes the basic ACID (Atomicity, Consistency, Isolation, Durability) and CRUD (Create, Read, Update, Delete) features that any good database should have. It explains in high-level general terms what makes a good database and what makes a bad database. "Database Types," explains some of the different types of databases that you might decide to use. These include flat files, spreadsheets, hierarchical databases (XML), object databases, and relational databases. The relational database is one of the most powerful and most commonly used forms of database so it is the focus of this book, but it is important to realize that there are alternatives that may be more appropriate under certain circumstances. This gives some tips on deciding which kind of database might be best for a particular project. "Relational Database Fundamentals," explains basic relational database concepts such as tables, rows, and columns. It explains the common usage of relational database terms in addition to the more technical terms that are sometimes used by database theorists. It describes different kinds of constraints that databases use to guarantee that the data is stored safely and consistently. "Understanding User Needs," explains how to learn about the users' needs and gather user requirements. It tells how to study the users' current operations, existing databases (if any), and desired improvements. It describes common questions that you can ask to learn about users' operations, desires, and needs, and how to build the results into requirements documents and specifications. This explains what use cases are and tells how to use them and the requirements to guide database design and to measure success. "Translating User Needs into Data Models," introduces data modeling. It explains how to translate the user's conceptual model and the requirements into other more precise models that define the database design rigorously. This describes several database modeling techniques including user-interface models, semantic object models, entity-relationship diagrams, and relational models. "Extracting Business Rules," explains how a database can handle business rules. It explains what business rules are, how they differ from database structure requirements, and how you can identify business rules. This explains the benefits of separating business rules from the database structure and tells how achieve that separation. "Normalizing Data," explains one of the biggest tools in database design: normalization. Normalization techniques allow you to restructure a database to increase its flexibility and make it more robust. This explains the various forms of normalization, emphasizing the stages that are most common and important: first, second, and third normal forms (1NF, 2NF, and 3NF). It explains how each of these kinds of normalization helps prevent errors and tells why it is sometimes better to leave a database slightly less normalized to improve performance. "Designing Databases to Support Software Applications," explains how databases fit into the larger context of application design and lifecycle. This explains how later development depends on the underlying database design. It discusses multi-tier architectures that can help decouple the application and database design so there can be at least some changes to either without requiring changes to the other. "Common Design Patterns," explains some common patterns that are useful in many applications. Some of these techniques include implementing various kinds of relationships among objects, storing hierarchical and network data, recording temporal data, and logging and locking. "Common Design Pitfalls," explains some common design mistakes that occur in database development. It describes problems that can arise from insufficient planning, incorrect normalization, and obsession with ID fields and performance. "User Needs and Requirements," walks through the steps required to analyze the users' problem, define requirements, and create use cases. It describes interviews with fictitious customers that are used to identify the application's needs and translate them into database requirements. "Building a Data Model," translates the requirements gathered in the previous into a series of data models that precisely define the database's structure. This builds user-interface models, entity-relationship diagrams, semantic object models, and relational models to refine the database's initial design. The final relational models match the structure of a relational database fairly closely so they are easy to implement. "Extracting Business Rules," identifies the business rules embedded in the relational model. It shows how to extract those rules in order to separate them logically from the database's structure. This makes the database more robust in the face of future changes to the business rules. "Normalization and Refinement," refines the relational model by normalizing it. It walks through several versions of the database that are in different normal forms. It then selects the degree of normalization that provides a reasonable tradeoff between robust design and acceptable performance. "Microsoft Access," explains how to build a database with Microsoft Access 2007. This explains enough to get started and to use Access to build non-trivial databases. You can use other versions of Access to work through this, although the locations of menus, buttons, and other Access features are different in different versions. "MySQL," explains how to build a database with MySQL. This tells where to download a free version of MySQL. It explains how to use the MySQL Command Line Client as well as some useful graphical tools including MySQL Query Browser and MySQL Workbench. "Introduction to SQL," provides an introduction to SQL (Structured Query Language). It explains how to use SQL commands to add, insert, update, and delete data. By using SQL, you can help insulate a program from the idiosyncrasies of the particular database product that it uses to store data. "Building Databases with SQL Scripts," explains how to use SQL scripts to build a database. It explains the advantages of this technique, such as the ability to create scripts to initialize a database before performing tests. It also explains some of the restrictions on this method, such as the fact that the user must create and delete tables in specific orders to satisfy table relationships. "Database Maintenance," describes some of the database maintenance issues that are part of any database application. Though performing and restoring backups, compressing tables, rebuilding indexes, and populating data warehouses are strictly not database design tasks, they are essential to any working application. "Database Security," explains database security issues. It explains the kinds of security that some database products provide. It also explains some additional techniques that can enhance database security such as using database views to appropriately restrict the users' access to data.

Professional Microsoft® SQL Server® 2008 Administration

SQL Server 2008 represents a sizable jump forward in scalability, performance, and usability for the DBA, developer, and business intelligence (BI) developer. It is no longer unheard of to have 20-terabyte databases running on a SQL Server. SQL Server administration used to just be the job of a database administrator (DBA), but as SQL Server proliferates throughout smaller companies, many developers have begun to act as administrators as well. Additionally, some of the new features in SQL Server are more developer-centric, and poor configuration of these features can result in poor performance. SQL Server now enables you to manage the policies on hundreds of SQL Servers in your environment as if you were managing a single instance. We've provided a comprehensive, tutorial-based book to get you over the learning curve of how to configure and administer SQL Server 2008. Whether you're an administrator or developer using SQL Server, you can't avoid wearing a DBA hat at some point. Developers often have SQL Server on their own workstations and must provide guidance to the administrator about how they'd like the production configured. Oftentimes, they're responsible for creating the database tables and indexes. Administrators or DBAs support the production servers and often inherit the database from the developer. This book is intended for developers, DBAs, and casual users who hope to administer or may already be administering a SQL Server 2008 system and its business intelligence features, such as Integration Services. This book is a professional book, meaning the authors assume that you know the basics about how to query a SQL Server and have some rudimentary concepts of SQL Server already. For example, this book does not show you how to create a database or walk you through the installation of SQL Server using the wizard. Instead, the author of the installation chapter may provide insight into how to use some of the more advanced concepts of the installation. Although this book does not cover how to query a SQL Server database, it does cover how to tune the queries you've already written. The first ten chapters of the book are about administering the various areas of SQL Server, including the developer and business intelligence features. Chapter 1 briefly covers the architecture of SQL Server and the changing role of the DBA. Chapters 2 and 3 dive into best practices on installing and upgrading to SQL Server 2008. Managing your SQL Server database instance is talked about in Chapter 4. This chapter also describes some of the hidden tools you may not even know you have. Once you know how to manage your SQL Server, you can learn in Chapter 5 how to automate many of the redundant monitoring and maintenance tasks. This chapter also discusses best practices on configuring SQL Server Agent. Chapters 6 and 7 cover how to properly administer and automate many tasks inside of the Microsoft business intelligence products, such as Integration Services and Analysis Services. Developers will find that Chapter 8 is very useful, as it covers how to administer the development features, such as SQL CLR. Chapter 9 explains how to secure your SQL Server from many common threats and how to create logins and users. Chapter 10 covers how to create a SQL Server project and do proper change management in promoting your scripts through the various environments. It also covers the Policy-Based Management framework in SQL Server. Chapters 11 through 15 make up the performance tuning part of the book. Chapter 11 discusses how to choose the right hardware configuration for your SQL Server in order to achieve optimal performance. After the hardware and operating system is configured, Chapter 12 shows you how to optimize your SQL Server instance for the best performance. Chapter 13 describes how to monitor your SQL Server instance for problematic issues such as blocking and locking. Chapters 14 and 15 discuss how to optimize the T-SQL that accesses your tables and then how to index your tables appropriately. Chapters 16 through 20 consist of the high-availability chapters of the book. Chapter 16 covers how to use the various forms of replication, while database mirroring is covered in Chapter 17. Classic issues and best practices with backing up and recovering your database are discussed in Chapter 18. Chapter 19 dives deeply into the role of log shipping in your high-availability strategy, and Chapter 20 presents a step-by-step guide to clustering your SQL Server and Windows 2008 server. This edition of the book covers all the same great information we covered in the last book, and we've added loads of new content for SQL Server 2008, which adds numerous new features to improve the DBA's life. In short, the new version of SQL Server focuses on improving your efficiency, the scale of your server, and the performance of your environment, so you can do more in much less time, and with fewer resources and people. This means you can manage many servers at one time using Policy-Based Management, scale your I/O load using compression, and collect valuable information about your environment using data collectors, to name just a few key new features. To follow the examples in this book, you will need to have SQL Server 2008 installed. If you wish to learn how to administer the business intelligence features, you need to have Analysis Services and the Integration Services components installed. You need a machine that can support the minimum hardware requirements to run SQL Server 2008; and you also need the AdventureWorks2008 and AdventureWorksDW2008 databases installed. Instructions for accessing these databases can be found in the ReadMe file on this book's Web site. Some features in this book (especially in the high-availability part) require the Enterprise or Developer Edition of SQL Server. If you do not have this edition, you will still be able to follow through some of the examples in the chapter with Standard Edition.

Mule 2: A Developer's Guide

Published with the developer in mind, firstPress technical briefs explore emerging technologies that have the potential to be critical for tomorrow's industry. Apress keeps developers one step ahead by presenting key information as early as possible in a PDF of 150 pages or less. Explore the future through Apress... Mule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications who wish to leverage the latest Mule as a lightweight messaging framework that contains a distributable object broker for managing communication between applications. The book is based on insight, knowledge, and experience resulting from working with Mule. The text provides support, consulting, and training to developers implementing Mule in a broad range of scenarios ranging from small projects through to large corporations developing major deployments. The author(s) have also developed the official training materials for Mule.

Googlepedia: The Ultimate Google Resource, Third Edition

Googlepedia® Third Edition The all-encompassing book about everything Google. Not only will you learn advanced search techniques, but you also will learn how to master Google’s web and software tools. It’s all inside! Google Chrome Google’s new web browser Google Gadgets create your own gadgets Google Gears turn web applications into desktop applications Android use Google’s phone Blogger create your own personal blog Gmail Google’s web-based email service Google Web Search the most popular search on the Internet Google AdSense put profit-making ads on their own website Google AdWords buy keyword advertising on the Google site Google Product Search find hot deals without ever leaving your office chair Google Calendar a web-based scheduling and public calendar service Google Desktop search documents and emails on your PC’s hard drive Google Docs create and share web-based word processing and spreadsheet documents Google Earth a fun way to view 3D maps of any location on Earth YouTube view and share videos over the Web Google Groups a collection of user-created message forums Google Maps maps, satellite images, and driving directions for any location GOOGLE MAY BE THE INTERNET’S MOST POPULAR SEARCH SITE, BUT IT’S ALSO MORE THAN JUST SIMPLE WEB SEARCHES. • Use Google developer tools and APIs • Create MySpace and Facebook applications with OpenSocial • Use Google Gears to turn web-based applications into desktop applications • Use Google to search for news headlines, scholarly articles, and the best prices on the Web • Read and respond to blog postings and create your own blogs with Blogger • View the latest viral videos with YouTube • Use Android, the new Google phone • Use Google with the Apple iPhone and iPod Touch • Create maps and driving directions with Google Maps • Use Google’s free web-based email service Gmail • Create your own custom Google Maps mashups–and put customized Google search on your own website Michael Miller has written more than 80 nonfiction how-to books, including Que’s Absolute Beginner’s Guide to Computer Basics, YouTube for Business, and Photopedia: The Ultimate Digital Photography Resource. Category: Internet Covers: Google User Level: Intermediate to Advanced

Programming Microsoft® SQL Server™ 2008

Extend your programming skills with a comprehensive study of the key features of SQL Server 2008. Delve into the new core capabilities, get practical guidance from expert developers, and put their code samples to work. This is a must-read for Microsoft .NET and SQL Server developers who work with data access—at the database, business logic, or presentation levels. Discover how to: Query complex data with powerful Transact-SQL enhancements Use new, non-relational features: hierarchical tables, native file streaming, and geospatial capabilities Exploit XML inside the database to design XML-aware applications Consume and deliver your data using Microsoft LINQ, Entity Framework, and data binding Implement database-level encryption and server auditing Build and maintain data warehouses Use Microsoft Excel to build front ends for OLAP cubes, and MDX to query them Integrate data mining into applications quickly and effectively. Get code samples on the Web.