talk-data.com talk-data.com

Topic

data

3406

tagged

Activity Trend

3 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Mastering the IBM WebFacing Tool

The IBM WebFacing Tool, part of IBM WebSphere Development Studio Client for iSeries, is one of the most important tools for IBM eServer iSeries developers. It facilitates quick conversion of existing host applications into Web applications. WebSphere Development Studio Client for iSeries comes in two editions, Standard and Advanced, each of which support a different level of features. WebSphere Development Studio Client for iSeries Advanced Edition V 5.1.2 introduces support for system screens for the WebFacing applications. This new feature removes one of the biggest limitations of previous versions of the IBM WebFacing Tool. This IBM Redbooks publication provides helpful guidance to developers who are new to refacing applications using the IBM WebFacing Tool. It also offers advanced techniques to developers who have some experience in using the IBM WebFacing Tool and want to refine their Web applications. First, this book introduces you to the IBM WebFacing Tool. Then it walks you through a scenario, which involves converting a 5250 application to a Web application. Next it explains how to refine your browser interface and customize a WebFacing application. Finally, it discusses how to integrate and extend your WebFacing application to provide the required and added functions. Please note that the additional material referenced in the text is not available from IBM.

Using ThinkVantage Technologies, Volume 1: Creating and Deploying Client Systems

ThinkVantage Technologies bring your IBM PCs one step closer to being self-configured, self-optimizing, self-protecting, or self-healing, to help save you time and money throughout the life of your systems. In short, ThinkVantage Technologies let you focus your attention on your business, rather than on your computer. ThinkVantage Technologies are software tools designed to help customers drive down IT support costs (in particular, the cost of a PC in managing and supporting systems after its initial purchase), increase security and decrease the complexity of today’s IT infrastructure. This series of Redbooks will help you install, tailor and configure the IBM ThinkVantage Technologies on IBM and OEM desktops. Using ThinkVantage Technologies, Volume 1: Creating and Deploying Client Systems describes how to create and deploy client systems. The tools covered include: - ImageUltra Builder

Oracle Database 10g PL/SQL Programming

Create dynamic client/server applications using PL/SQL and the comprehensive information contained in this authoritative volume. Expert Oracle insiders cover the features of PL/SQL, explain scripting semantics and syntax, and fully detail the PL/SQL functionality of Oracle Database 10 g. You’ll learn how to write powerful PL/SQL programs, interact with Oracle databases, perform complex calculations, and handle error conditions.

IBM Tivoli Monitoring for Network Performance V2.1 The Mainframe Network Management Solution

This IBM Redbooks publication explains the new IBM Tivoli Monitoring for Network Performance Version 2.1. This version of IBM Tivoli Monitoring for Network Performance provides a complete redesign of the z/OS TCP/IP management tools that is started by the NetView Performance Monitor for TCP/IP. IBM Tivoli Monitoring for Network Performance provides a comprehensive TCP/IP stack monitoring for z/OS. It collects performance metrics from the z/OS Communication Servers system management interface, measuring response time and Simple Network Management Protocol (SNMP) Management Information Base (MIB) variable collection. IBM Tivoli Monitoring for Network Performance uses strategic IBM software platforms such as WebSphere Application Server as the Web application platform and DB2 Universal Database as the central repository. This book starts with exploring on the architecture of IBM Tivoli Monitoring for Network Performance and its components. We also discuss various implementation scenario and evaluate the benefits and drawbacks of each scenario. Implementation planning and consideration is presented and lastly operational consideration is explained.

The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data

Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the extract, transform, load (ETL) process Delineates best practices for extracting data from scattered sources, removing redundant and inaccurate data, transforming the remaining data into correctly formatted data structures, and then loading the end product into the data warehouse Offers proven time-saving ETL techniques, comprehensive guidance on building dimensional structures, and crucial advice on ensuring data quality

Oracle® 9i SQL Exam Cram™ 2 (Exam 1Z0-007)

Whether you're studying for the Oracle 9i SQL exam or just need to take the New Features update exam, Oracle 9i: SQL Exam Cram 2 can help you get certified. This efficient study guide follows the exam objectives clearly and concisely. New Features materials are also included in the book, as well as a full-customizable practice test engine on CD. Oracle 9i: SQL Exam Cram 2 is your smartest way to get certified.

PHP and MySQL Web Development, Third Edition

A new edition of this title is available, ISBN-10: 0672329166 ISBN-13: 9780672329166 We've taken the best and made it even better. The third edition of the best-selling PHP and MySQL Web Development has been updated to include material and code on MySQL 5, PHP 5 and on PHPs object model and validation. Through a clear, practical approach, you will learn to develop secure, dynamic websites by integrating and implementing the PHP scripting language and the MySQL database system. Real-world examples and working sample projects will give you a strong foundation on which to start building your own websites, complete with features such as SSL, shopping carts and payment systems. The accompanying CD includes the source code from each example in the book, the entire book in PDF format, and source code and binaries for PHP 5, MySQL 5 and Apache. Readers have called PHP and MySQL Web Development call it the best technical book they've ever read, but don't take their word for it. Find out for yourself!

Oracle Database 10g The Complete Reference

Get a thorough understanding of Oracle Database 10 g from the most comprehensive Oracle database reference on the market, published by Oracle Press. From critical architecture concepts to advanced object-oriented concepts, this powerhouse contains nearly 50 chapters designed to enlighten you. Upgrade from earlier versions, use SQL, SQL Plus, and PL/SQL. Get code examples and access popular documentation PDFs--plus a full electronic copy of the book on the included CD-ROM. Go beyond the basics and learn security, text searches, external tables, using Java in Oracle, and a great deal more.

Beginning Access 2003 VBA

What is this book about? Written by an Access programmer with more than 10 years of VBA experience, this is the perfect guide for Access users who are ready to take their databases to the next level, or for programmers who are new to Access or VBA. Veteran Access developer Denise Gosnell shows readers the ins and outs of Access VBA and provides plenty of source code, and fully developed sample applications to guide you along the way. Not only do readers learn to build "stand-alone" desktop applications, but readers also learn how to integrate Access applications with Web Services, and SQL Server.

SQL in a Nutshell, 2nd Edition

SQL in a Nutshell applies the eminently useful "Nutshell" format to Structured Query Language (SQL), the elegant--but complex--descriptive language that is used to create and manipulate large stores of data. For SQL programmers, analysts, and database administrators, the new second edition of SQL in a Nutshell is the essential date language reference for the world's top SQL database products. SQL in a Nutshell is a lean, focused, and thoroughly comprehensive reference for those who live in a deadline-driven world.This invaluable desktop quick reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It describes every command and reference and includes the command syntax (by vendor, if the syntax differs across implementations), a clear description, and practical examples that illustrate important concepts and uses. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format that covers the SQL syntax of no less than 4 different databases.When you need fast, accurate, detailed, and up-to-date SQL information, SQL in a Nutshell, Second Edition will be the quick reference you'll reach for every time. SQL in a Nutshell is small enough to keep by your keyboard, and concise (as well as clearly organized) enough that you can look up the syntax you need quickly without having to wade through a lot of useless fluff. You won't want to work on a project involving SQL without it.

XML in a Nutshell, 3rd Edition

If you're a developer working with XML, you know there's a lot to know about XML, and the XML space is evolving almost moment by moment. But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

End-to-End Scheduling with IBM Tivoli Workload Scheduler Version 8.2

The beginning of the new century sees the data center with a mix of work, hardware, and operating systems previously undreamed of. Today’s challenge is to manage disparate systems with minimal effort and maximum reliability. People experienced in scheduling traditional host-based batch work must now manage distributed systems, and those working in the distributed environment must take responsibility for work running on the corporate OS/390 system. This IBM Redbooks publication considers how best to provide end-to-end scheduling using IBM Tivoli Workload Scheduler Version 8.2, both distributed (previously known as Maestro) and mainframe (previously known as OPC) components. In this book, we provide the information for installing the necessary Tivoli Workload Scheduler 8.2 software components and configuring them to communicate with each other. In addition to technical information, we consider various scenarios that may be encountered in the enterprise and suggest practical solutions. We describe how to manage work and dependencies across both environments using a single point of control. We believe that this book will be a valuable reference for IT specialists who implement end-to-end scheduling with Tivoli Workload Scheduler 8.2.

Privacy What Developers and IT Professionals Should Know

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." —Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." —Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." —Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." —Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." —Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." —Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." —Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-enhancing and potentially privacy-invading technologies, J.C.'s analysis is thorough and well-balanced. J.C. also explains many of the legal implications of electronic privacy policies and technologies, providing an invaluable domestic and international view." —Steve Riley, Product Manager, Security Business and Technology Unit, Windows Division, Microsoft "Privacy concerns are pervasive in today's high-tech existence. The issues covered by this book should be among the foremost concerns of developers and technology management alike." —Len Sassaman, Security Architect, Anonymizer, Inc. You're responsible for your customers' private information. If you betray their trust, it can destroy your business. Privacy policies are no longer enough. You must make sure your systems truly protect privacy—and it isn't easy. That's where this book comes in. J.C. Cannon, Microsoft's top privacy technology strategist, covers every facet of protecting customer privacy, both technical and organizational. You'll learn how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform. You'll discover the best practices for building business infrastructure and processes that protect customer privacy. You'll even learn how to help your customers work with you in protecting their own privacy. Coverage includes How privacy and security relate—and why security isn't enough Understanding your legal obligations to protect privacy Contemporary privacy policies, privacy-invasive technologies, and privacy-enhancing solutions Auditing existing systems to identify privacy problem areas Protecting your organization against privacy intrusions Integrating privacy throughout the development process Developing privacy-aware applications: a complete sample application Building a team to promote customer privacy: staffing, training, evangelization, and quick-response Protecting data and databases via role-based access control Using Digital Rights Management to restrict customer information Privacy from the customer's standpoint: spam avoidance, P3P, and other tools and resources Whether you're a manager, IT professional, developer, or security specialist, this book delivers all the information you need to protect your customers—and your organization. The accompanying CD-ROM provides sample privacy-enabling source code and additional privacy resources for developers and managers. J. C. CANNON, privacy strategist at Microsoft's Corporate Privacy Group, specializes in implementing application technologies that maximize consumer control over privacy and enable developers to create privacy-aware applications. He works closely with Microsoft product groups and external developers to help them build privacy into applications. He also contributed the chapter on privacy to Michael Howard's Writing Secure Code (Microsoft Press 2003). Cannon has spent nearly twenty-five years in software development. © Copyright Pearson Education. All rights reserved.

Patterns: Information Aggregation and Data Integration with DB2 Information Integrator

This IBM Redbooks publication documents and prototypes the role of DB2 Information Integrator technologies and architecture in IBM's Patterns for e-business using a typical customer insight e-business scenario. It is aimed at an audience of IT architects and data integration professionals responsible for developing e-business solutions that integrate processes and data from multiple distributed heterogeneous systems. This publication provides an overview of IBM’s Patterns for e-business, and the DB2 Information Integration architecture. It also describes the various application and runtime patterns identified to date for Information Aggregation and Data Integration, as defined in "Patterns for e-business". Using a typical customer insight e-business scenario, this publication documents the step-by-step patterns approach to implementing the e-business solution. At each level in the hierarchy, each available pattern is evaluated and chosen before drilling down to the next lower layer where the pattern evaluation and selection process is repeated. The final drill down leads to product selection and implementation information.

Business solutions Automating Microsoft® Access with VBA

If you use Microsoft Access in your every day business life but haven't learned to fully exploit the program, now's your chance. Automating Microsoft Access with VBA is a thorough introduction to programming Microsoft Accessing using Visual Basic for Applications (VBA). With this book, you will gain a working knowledge of VBA and be able to customize your Microsoft Access databases. You will cover topics that include: Operators and functions Debugging and error handling Menu commands Forms and reports Jet databases DAO object model Save money by learning to use VBA to customize your databases instead of paying someone else to do it for you!

Exploring Storage Management Efficiencies and Provisioning - Understanding IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning

This IBM Redbooks publication provides an overview of the solution offerings — IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning. It presents an overview of the product components and functions, explaining the architecture and showing the use of storage provisioning workflows. This book is intended for those who want to learn more about IBM TotalStorage Productivity Center, IBM TotalStorage Productivity Center with Advanced Provisioning, and IBM TotalStorage Provisioning Manager. This easy-to-follow guide describes on demand provisioning for managing resources and information, as well as enhancing automation by explaining how these innovative offerings may improve client business. The book explains how to take storage management concepts to the next level, describing the architecture, components, and component interaction, explaining storage automation, and showing how to create high and low level workflows by using examples along with common storage management tasks. Narrated screen recordings in QuickTime format: IBM TotalStorage Productivity Center LaunchPad demonstration (26MB) IBM Tivoli TotalStorage Provisioning Manager Overview (62MB) IBM TotalStorage Productivity Center with Advanced Provisioning Workflow Case Study (66MB) Please note that the additional material referenced in the text is not available from IBM.

IBM Enterprise Workload Manager Release 1

This IBM Redbooks publication provides an introduction to the Enterprise Workload Manager (EWLM). In addition to describing the overall product concept and functionality, it presents a detailed discussion of the elements that are part of the solution.

Oracle Initialization Parameters Pocket Reference

Oracle designed its database products to be flexible and configurable so they would operate on a variety of hardware platforms, and they succeeded--Oracle software runs on more than seventy computer platforms, from mainframes to PC networks to handheld PDAs. The secret to this flexibility lies in the software's initialization parameters, whose numerous settings can be configured for top performance in countless environments. On the downside, however, improper settings can slow a system down; even grind it to a halt. And with so many parameters--which change from version to version of Oracle software--it's challenging for Oracle administrators to keep in mind the characteristics and optimal settings for each parameter.The Oracle Initialization Parameters Pocket Reference provides the crucial information you need to make key adjustments to your Oracle database. This concise guide is a mix of invaluable performance tips and a quick reference to Oracle's initialization parameters. The book describes each initialization parameter, indicates what category it's in--from auditing to multi-threaded server MTS--and whether it can be modified dynamically via the ALTER SESSION or ALTER SYSTEM command.In addition to the details about parameter characteristics and settings, you'll find performance tips, such as how the various parameters interact, and what the most advantageous settings are for different configurations. No other reference focuses exclusively on these initialization parameters--an absolute must for anyone working with an Oracle database.Presented in a handy, easy-to-use format, the Oracle Initialization Parameters Pocket Reference is a welcome alternative for anyone who's struggled to memorize the best configuration settings or gone back and forth to online resources, trying to figure out what works. O'Reilly's Pocket References put the information you need close at hand where you need it most. This guide will keep your Oracle databases operating at peak performance.

Microsoft® Access 2003 Forms, Reports and Queries

When it comes to job-productivity, we all want to be able to perform well, especially when it comes to challenging assignments. Anyone who works with Microsoft Access on a regular basis knows that this program can prove to be one of the most challenging. If you are looking for a way to get the most you can out of the primary Access tasks, Microsoft Access 2003 Forms, Reports and Queries is the learning tool that you need. Focusing only on the forms, reports and queries functions, this book provides you with practical know-how, real-world examples and techniques that you can put to use immediately. Learn to condense mountains of information into manageable molehills of useful knowledge, so that you can perform at your best!