talk-data.com talk-data.com

Topic

data

5765

tagged

Activity Trend

3 peak/qtr
2020-Q1 2026-Q1

Activities

5765 activities · Newest first

Developing Feeds with RSS and Atom

Perhaps the most explosive technological trend over the past two years has been blogging. As a matter of fact, it's been reported that the number of blogs during that time has grown from 100,000 to 4.8 million-with no end to this growth in sight.What's the technology that makes blogging tick? The answer is RSS--a format that allows bloggers to offer XML-based feeds of their content. It's also the same technology that's incorporated into the websites of media outlets so they can offer material (headlines, links, articles, etc.) syndicated by other sites.As the main technology behind this rapidly growing field of content syndication, RSS is constantly evolving to keep pace with worldwide demand. That's where Developing Feeds with RSS and Atom steps in. It provides bloggers, web developers, and programmers with a thorough explanation of syndication in general and the most popular technologies used to develop feeds.This book not only highlights all the new features of RSS 2.0-the most recent RSS specification-but also offers complete coverage of its close second in the XML-feed arena, Atom. The book has been exhaustively revised to explain: After an introduction that examines Internet content syndication in general (its purpose, limitations, and traditions), this step-by-step guide tackles various RSS and Atom vocabularies, as well as techniques for applying syndication to problems beyond news feeds. Most importantly, it gives you a firm handle on how to create your own feeds, and consume or combine other feeds.If you're interested in producing your own content feed, metadata interpretation the different forms of content syndication the increasing use of web services how to use popular RSS news aggregators on the market Developing Feeds with RSS and Atom is the one book you'll want in hand.

The IBM eServer BladeCenter JS20

Blade servers are a relatively new technology. They have captured industry focus because of their modular design, which can reduce cost with a more efficient use of valuable floor space. They offer simplified management, which can help to speed such tasks as installing, reprovisioning, updating, and troubleshooting hundreds of blade servers. You can do all of this remotely using one graphical console with IBM Director systems management tools. In addition, blade servers provide improved performance by doubling current rack density. By integrating resources and sharing key components, costs decrease and availability increases. The IBM eServer BladeCenter boasts innovative modular technology, leadership density, and availability. It was designed to help solve a multitude of real-world problems. This IBM Redbooks publication takes an in-depth look at the IBM eServer BladeCenter JS20. This is a two-way blade server for applications requiring 64-bit computing. It is ideal for computer-intensive applications and transactional Internet servers. This book helps you to install, tailor, and configure the IBM eServer BladeCenter JS20.

Certification Study Guide: IBM Tivoli Configuration Manager (ITCM) Version 4.2.2

This IBM Redbooks publication is a study guide for IBM Tivoli Configuration Manager Version 4.2.2 and is aimed at the people who want to get IBM Certifications in this specific product. The IBM Tivoli Configuration Manager Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation of the IBM Tivoli Configuration Manager Version 4.2.2 product. This book provides a combination of theory and practical experience needed for a general understanding of the subject matter. It also provides sample questions that will help in the evaluation of personal progress and provide familiarity with the types of questions that will be encountered in the exam. This publication does not replace practical experience, nor is it designed to be a stand-alone guide for any subject. Instead, it is an effective tool that, when combined with education activities and experience, can be a very useful preparation guide for the exam. Please note that the additional material referenced in the text is not available from IBM.

File System Forensic Analysis

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Beginning InfoPath™ 2003

InfoPath creates forms for data gathering, analysis, and reporting InfoPath has been adopted by many companies, ranging from Toyota and Hewlett-Packard to M/I Homes and New York Presbyterian Hospital, and recent laws that regulate data collection, such as Sarbanes-Oxley and HIPPA, have increased demand Explains how to use InfoPath in a single user mode and how to use it with other databases, such as Access and SQL Server, or in conjunction with XML Web services Shows how to deploy multi-user forms that use InfoPath with collaborative products such as Windows SharePoint Services and BizTalk

IBM iDoctor iSeries Job Watcher: Advanced Performance Tool

This IBM Redbooks publication is intended for those familiar with most of the IBM-provided iSeries performance tools that are generally available through the i5/OS operating systems commands and iSeries Navigator interfaces and the additional-cost Performance Tools for iSeries, 5722-PT1, licensed program. iDoctor for iSeries is a set of software performance analysis tools and associated services that extend your ability to evaluate the health of your iSeries-based system by gathering detailed information and providing automated, graphical analysis of this data. One of these tools, Job Watcher, is the key next-step advanced tool for analyzing detailed performance data. This book: This book's objective is to enhance the performance analyst’s proficiency in using Job Watcher as a key tool in the performance analysis tool kit.

Rexx Programmer's Reference

Originally developed for mainframes but highly portable across platforms-from servers to desktops to handhelds-Rexx is an easy yet powerful scripting language that's widely used for rapid application development. Covers Rexx interpreters for specialized functions-object-oriented, mainframe, and handheld. There are 8 different free Rexx interpreters optimized for different platforms and uses. This book shows how to use them all. Shows how to script for GUIs, databases, web servers, XML, and other interfaces. Details how to make the best use of Rexx tools and interfaces, with examples for both Linux and Windows. Includes a tutorial with lots of examples to help people get up and running.

Access 2003 Programming by Example with VBA, XML, and ASP

This book is designed to take Microsoft Access users to the next step in programming. Its five parts cover an intro-duction to VBA programming, manipulating databases with ADO, using DDL, event programming, and using ASP and XML. With more than 300 hands-on examples and 11 custom projects, users can quickly build the toolset required for developing their own database solutions. Learn how to write and debug your programming code with the Visual Basic Editor, and understand and use common VBA programming structures such as conditions, loops, arrays, and collections. Learn how to create and manage databases with ActiveX Data Objects (ADO), and perform database tasks with Jet/Access Structured Query Language (SQL) and its Data Definition Language (DDL) component. Learn how to query and manipulate your database from a web browser with Active Server Pages (ASP) and export and import Access data to and from XML both manually and programmatically.

Beginning SQL

Taking readers through the basics of the language, right up to some more advanced topics, this book is a practical, hands-on resource and aims to keep the reader involved at all times Focuses on the SQL standard and is loaded with detailed examples and code; each chapter includes practice exercises that readers can challenge themselves with before looking at the sample solutions in the appendix Paul Wilton is a successful Wrox "Beginning" book author and is an ideal author to write for those who want a firm grasp of standard SQL before learning the details specific to a particular database product SQL is an international standard for manipulating data in databases and is used by database programmers in all major database systems: Microsoft, IBM, Oracle, MySQL, and many others

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As you’ll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all kinds of data, and genetic algorithms and evolutionary programming techniques drawn from biology provide the most effective means for designing and tuning these systems. You don’t need a background in fuzzy modeling or genetic algorithms to benefit, for this book provides it, along with detailed instruction in methods that you can immediately put to work in your own projects. The author provides many diverse examples and also an extended example in which evolutionary strategies are used to create a complex scheduling system. Written to provide analysts, engineers, and managers with the background and specific instruction needed to develop and implement more effective data mining systems Helps you to understand the trade-offs implicit in various models and model architectures Provides extensive coverage of fuzzy SQL querying, fuzzy clustering, and fuzzy rule induction Lays out a roadmap for exploring data, selecting model system measures, organizing adaptive feedback loops, selecting a model configuration, implementing a working model, and validating the final model In an extended example, applies evolutionary programming techniques to solve a complicated scheduling problem Presents examples in C, C++, Java, and easy-to-understand pseudo-code Extensive online component, including sample code and a complete data mining workbench

Patterns: Pervasive and Rich Device Access Solutions

Patterns for e-business are a group of proven, reusable assets that can be used to increase the speed of developing and deploying e-business applications. This IBM Redbooks publication focuses on the architecture and implementation of pervasive solutions using currently available IBM products. Part 1 uses the Patterns for e-business to describe the Application and Runtime patterns applicable to pervasive solutions. IBM product mappings are applied to these patterns. Part 2 describes the technologies key to building pervasive solutions. It also describes the IBM development tools for building these solutions. Part 3 consists of eight pervasive scenarios. Each scenario implements an IBM product mapping, and provides design, development, and runtime guidelines for building these scenarios. Please note that the additional material referenced in the text is not available from IBM.

OCP: Oracle 10g Administration II Study Guide: Exam 1Z0-043

Here's the book you need to prepare for the Oracle Database 10g Administration II exam, 1Z0-043. This Study Guide was developed to meet the exacting requirements of today's Oracle certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the "Best Study Guide" selection in CertCities Readers' Choice Awards for two consecutive years, this book provides: Clear and concise information on advanced database administration with Oracle 10g Practical examples and insights drawn from the authors' real-world experiences Leading-edge exam preparation software, including a test engine and electronic flashcards You'll also find authoritative coverage of key exam topics, including: Configuring Recovery Manager Understanding the Flashback Database Recovering from User Errors Working with Globalization Support Using the Scheduler to Automate Tasks Monitoring and Managing Storage Securing the Oracle Listener Look to Sybex for the knowledge and skills needed to succeed in today's competitive IT marketplace.

Analysis of Clinical Trials Using SAS

In Analysis of Clinical Trials Using SAS: A Practical Guide, Alex Dmitrienko, Geert Molenberghs, Christy Chuang-Stein, and Walter Offen bridge the gap between modern statistical methodology and real-world clinical trial applications. Step-by-step instructions illustrated with examples from actual trials and case studies serve to define a statistical method and its relevance in a clinical trials setting and to illustrate how to implement the method rapidly and efficiently using the power of SAS software. Topics reflect the International Conference on Harmonization (ICH) guidelines for the pharmaceutical industry and address important statistical problems encountered in clinical trials, including analysis of stratified data, incomplete data, multiple inferences, issues arising in safety and efficacy monitoring, and reference intervals for extreme safety and diagnostic measurements. Clinical statisticians, research scientists, and graduate students in biostatistics will greatly benefit from the decades of clinical research experience compiled in this book. Numerous ready-to-use SAS macros and example code are included.

This book is part of the SAS Press program.

Modernizing IBM eServer iSeries Application Data Access - A Roadmap Cornerstone

In 1978 IBM introduced the System/38 as part of its midrange platform hardware base. One of the many outstanding features of this system was the built-in Relational Database Management System (RDMS) support. The system included a utility for defining databases, screens, and reports. This utility used a form named Data Description Specifications (DDS) to define the database physical (PF) and logical (LF) files (base tables, views, and indexes). In 1988, IBM announced the AS/400. The OS/400 operating system also contained a built-in RDMS, however, IBM offered Structured Query Language (SQL) as an alternative to DDS for creating databases. In addition, SQL Data Manipulation Language (DML) statements were made available as an ad hoc query language tool. These statements could also be embedded and compiled within high level language (HLL) programs. SQL Data Definition Language (DDL) has become the industry standard for defining RDMS databases. Many customers are in the process of modernizing their database definition and the database access. This IBM Redbooks publication will help you understand how to reverse engineer a DDS-created database along, and provides you with tips and techniques for modernizing applications to use SQL as the database access method. Additional Resources on DB2 for i Modernization:

OASIS OpenDocument Essentials: Using OASIS OpenDocument XML

The Organization for the Advancement of Structured Information Standards (OASIS) recently approved OpenDocument as standard. OpenDocument is "a royalty-free, XML-based file format that covers features required by text, spreadsheets, charts, and graphical documents." OpenDocument serves as the native file format for OpenOffice.org version 2 and future versions of KOffice. OASIS OpenDocument Essentials—Using OASIS OpenDocument XML shows you how to take advantage of this format. In addition to explaining the basics of OpenDocument, this book has examples showing how to extract information from, transform, and programmatically create OpenDocument files.

Lotus Workplace 2.0.1 Products: Deployment Guide

IBM Lotus software has created IBM Lotus Workplace, an integrated family of products based on open standards. Lotus Workplace combines market-leading collaborative components that can be used with a variety of security-rich clients for simplified access and interaction with other people and a host of collaborative applications such as e-mail, calendaring and scheduling, instant messaging, Web conferencing, team spaces, document and Web content management, and e-learning. IBM Lotus Workplace products include: This IBM Redbooks publication is an installation and deployment guide for the Lotus Workplace 2.0.1 platform. We provide detailed installation procedures for installing the Lotus Workplace products on both a Microsoft Windows 2000 server and a Linux server running SUSE LINUX Enterprise Server 8.1. We also discuss important deployment and planning scenarios, as well as tips, best practices, and techniques for troubleshooting errors during installation.

Using MQSeries for VSE

This IBM Redbooks publication will help you get started with MQSeries for VSE V2R1.2. It explores why and how to use MQSeries with the VSE operating system and shows why MQSeries is more than just another queuing system. This book is meant for those who know VSE but have only a slight understanding of MQSeries and how to use it. This book contains an overview of the MQSeries installation and configuration, explains how to connect clients to servers and servers to servers, how to trigger applications, and the MQI programming interface. It describes the command interface, how the libraries are used, and how to edit, compile, test, and debug a program. This book also provides information about performance and security for the MQSeries for VSE V2.1.2. It explains what has to be done to use MQSeries for communication between VSE and other platforms, such as OS/390 and Windows XP. Examples are given to guide the user through the administrative process of defining connections between different systems, and information regarding security, backup, and recovery is also provided.

Visual QuickProject Guide: Creating a Database In FileMaker Pro

The problem: Your boss has demanded a database, and you don't know how to create one. It doesn't matter that it's just a simple one (for tracking invoices, inventory, and contacts), or that flexible, powerful software (FileMaker Pro 7) has already been purchased. If you've never created a database before, the task can be daunting. The solution: This low-priced, compact guide! Recognizing that you don't necessarily want or need to know about every FileMaker Pro 7 feature, this focused, four-color volume demonstrates the quickest route to creating a functional, organized database-nothing more and certainly nothing less. Using large color illustrations and a minimum of verbiage, it provides the basics you need to get going without bogging you down with detailed explanations of all of FileMaker's intricacies. It also serves as the perfect jumping-off point for more extensive database exploration-for example, through FileMaker Pro 7: Visual QuickStart Guide.

Understanding DB2®: Learning Visually with Examples

The Easy, Visual Guide to IBM DB2 V8.2 IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. teaches DB2 V8.2 visually, step by step, with dozens of examples and case studies drawn from the authors' unsurpassed experience as DB2 consultants at IBM. Understanding DB2 doesn't just present the big picture. It thoroughly introduces every DB2 concept, procedure, and tool you'll need to get results as an administrator, user, or developer. You'll find authoritative coverage of installation, configuration, objects, database instances, storage, connectivity, security, performance, backup and recovery, SQL fundamentals, and much more. Virtually every new concept is explained with screenshots, diagrams, or tables, all designed to help you learn faster and remember more. Understanding DB2 For those preparing for certification, this book also contains over a hundred sample questions crafted by the authors to reflect the content and format of the IBM DB2 UDB Database Administration Certification exams, with answers and detailed explanations. Coverage includes Understanding the DB2 product family, DB2 commands, and the DB2 environment Configuring client and server connectivity: walkthroughs of four typical scenarios Managing DB2 storage: partitions, tablespaces, buffer pools, and more Leveraging the power of SQL: queries, inserts, deletes, and updates Implementing security: encryption, authentication, and authorization Administering and maintaining data, from LOAD and EXPORT to backup/recovery Providing high availability with online split mirroring and suspended I/O DB2 architecture: process and memory models Managing database performance and troubleshooting