talk-data.com talk-data.com

Topic

data

5765

tagged

Activity Trend

3 peak/qtr
2020-Q1 2026-Q1

Activities

5765 activities · Newest first

XML in a Nutshell, 3rd Edition

If you're a developer working with XML, you know there's a lot to know about XML, and the XML space is evolving almost moment by moment. But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

End-to-End Scheduling with IBM Tivoli Workload Scheduler Version 8.2

The beginning of the new century sees the data center with a mix of work, hardware, and operating systems previously undreamed of. Today’s challenge is to manage disparate systems with minimal effort and maximum reliability. People experienced in scheduling traditional host-based batch work must now manage distributed systems, and those working in the distributed environment must take responsibility for work running on the corporate OS/390 system. This IBM Redbooks publication considers how best to provide end-to-end scheduling using IBM Tivoli Workload Scheduler Version 8.2, both distributed (previously known as Maestro) and mainframe (previously known as OPC) components. In this book, we provide the information for installing the necessary Tivoli Workload Scheduler 8.2 software components and configuring them to communicate with each other. In addition to technical information, we consider various scenarios that may be encountered in the enterprise and suggest practical solutions. We describe how to manage work and dependencies across both environments using a single point of control. We believe that this book will be a valuable reference for IT specialists who implement end-to-end scheduling with Tivoli Workload Scheduler 8.2.

Privacy What Developers and IT Professionals Should Know

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." —Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." —Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." —Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." —Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." —Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." —Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." —Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-enhancing and potentially privacy-invading technologies, J.C.'s analysis is thorough and well-balanced. J.C. also explains many of the legal implications of electronic privacy policies and technologies, providing an invaluable domestic and international view." —Steve Riley, Product Manager, Security Business and Technology Unit, Windows Division, Microsoft "Privacy concerns are pervasive in today's high-tech existence. The issues covered by this book should be among the foremost concerns of developers and technology management alike." —Len Sassaman, Security Architect, Anonymizer, Inc. You're responsible for your customers' private information. If you betray their trust, it can destroy your business. Privacy policies are no longer enough. You must make sure your systems truly protect privacy—and it isn't easy. That's where this book comes in. J.C. Cannon, Microsoft's top privacy technology strategist, covers every facet of protecting customer privacy, both technical and organizational. You'll learn how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform. You'll discover the best practices for building business infrastructure and processes that protect customer privacy. You'll even learn how to help your customers work with you in protecting their own privacy. Coverage includes How privacy and security relate—and why security isn't enough Understanding your legal obligations to protect privacy Contemporary privacy policies, privacy-invasive technologies, and privacy-enhancing solutions Auditing existing systems to identify privacy problem areas Protecting your organization against privacy intrusions Integrating privacy throughout the development process Developing privacy-aware applications: a complete sample application Building a team to promote customer privacy: staffing, training, evangelization, and quick-response Protecting data and databases via role-based access control Using Digital Rights Management to restrict customer information Privacy from the customer's standpoint: spam avoidance, P3P, and other tools and resources Whether you're a manager, IT professional, developer, or security specialist, this book delivers all the information you need to protect your customers—and your organization. The accompanying CD-ROM provides sample privacy-enabling source code and additional privacy resources for developers and managers. J. C. CANNON, privacy strategist at Microsoft's Corporate Privacy Group, specializes in implementing application technologies that maximize consumer control over privacy and enable developers to create privacy-aware applications. He works closely with Microsoft product groups and external developers to help them build privacy into applications. He also contributed the chapter on privacy to Michael Howard's Writing Secure Code (Microsoft Press 2003). Cannon has spent nearly twenty-five years in software development. © Copyright Pearson Education. All rights reserved.

Patterns: Information Aggregation and Data Integration with DB2 Information Integrator

This IBM Redbooks publication documents and prototypes the role of DB2 Information Integrator technologies and architecture in IBM's Patterns for e-business using a typical customer insight e-business scenario. It is aimed at an audience of IT architects and data integration professionals responsible for developing e-business solutions that integrate processes and data from multiple distributed heterogeneous systems. This publication provides an overview of IBM’s Patterns for e-business, and the DB2 Information Integration architecture. It also describes the various application and runtime patterns identified to date for Information Aggregation and Data Integration, as defined in "Patterns for e-business". Using a typical customer insight e-business scenario, this publication documents the step-by-step patterns approach to implementing the e-business solution. At each level in the hierarchy, each available pattern is evaluated and chosen before drilling down to the next lower layer where the pattern evaluation and selection process is repeated. The final drill down leads to product selection and implementation information.

Business solutions Automating Microsoft® Access with VBA

If you use Microsoft Access in your every day business life but haven't learned to fully exploit the program, now's your chance. Automating Microsoft Access with VBA is a thorough introduction to programming Microsoft Accessing using Visual Basic for Applications (VBA). With this book, you will gain a working knowledge of VBA and be able to customize your Microsoft Access databases. You will cover topics that include: Operators and functions Debugging and error handling Menu commands Forms and reports Jet databases DAO object model Save money by learning to use VBA to customize your databases instead of paying someone else to do it for you!

Even You Can Learn Statistics A Guide for Everyone Who Has Ever Been Afraid of Statistics

Even You Can Learn Statistics A Guide for Everyone Who Has Ever Been Afraid Of Statistics One easy step at a time, this book will teach you the key statistical techniques you'll need for finance, quality, marketing, the social sciences, or just about any other field. Each technique is introduced with a simple, jargon-free explanation, practical examples, and hands-on guidance for solving real problems with Excel or a TI-83/84 series calculator, including Plus models. Hate math? No sweat. You'll be amazed how little you need! For those who do have an interest in mathematics, optional "Equation Blackboard" sections review the equations that provide the foundations for important concepts. David M. Levine is a much-honored innovator in statistics education. He is Professor Emeritus of Statistics and Computer Information Systems at Bernard M. Baruch College (CUNY), and co-author of several best-selling books, including Statistics for Managers using Microsoft Excel, Basic Business Statistics, Quality Management, and Six Sigma for Green Belts and Champions. Instructional designer David F. Stephan pioneered the classroom use of personal computers, and is a leader in making Excel more accessible to statistics students. He has co-authored several textbooks with David M. Levine. Here's just some of what you'll learn how to do... Use statistics in your everyday work or study Perform common statistical tasks using a Texas Instruments statistical calculator or Microsoft Excel Build and interpret statistical charts and tables "Test Yourself" at the end of each chapter to review the concepts and methods that you learned in the chapter Work with mean, median, mode, standard deviation, Z scores, skewness, and other descriptive statistics Use probability and probability distributions Work with sampling distributions and confidence intervals Test hypotheses and decision-making risks with Z, t, Chi-Square, ANOVA, and other techniques Perform regression analysis and modeling The easy, practical introduction to statistics–for everyone! Thought you couldn't learn statistics? Think again. You can–and you will! Complementary Web site Downloadable practice files at http://www.ftpress.com/youcanlearnstatistics

PROC SQL: Beyond the Basics Using SAS®

Master the language of PROC SQL! Get faster and better results when you use the SQL procedure with this step-by-step, example-driven guide in your hands. You will find information about implementing both American National Standards Institute (ANSI) guidelines and non-ANSI features. A broad range of SAS users, including applications programmers, database designers and administrators, statisticians, and systems analysts, will find techniques in Kirk Lafler's PROC SQL: Beyond the Basics Using SAS to enhance their data access, manipulation, and presentation prowess. Topics examined include database design; an introduction to SQL, dictionary tables, and tables; coding PROC SQL logic as well as complex queries; working with views; troubleshooting and debugging SQL code; and tuning for performance. With the growing popularity of databases, PROC SQL is becoming the language of choice for SAS users around the world. Intermediate and advanced users will appreciate the straightforward explanations and numerous examples.

Exploring Storage Management Efficiencies and Provisioning - Understanding IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning

This IBM Redbooks publication provides an overview of the solution offerings — IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning. It presents an overview of the product components and functions, explaining the architecture and showing the use of storage provisioning workflows. This book is intended for those who want to learn more about IBM TotalStorage Productivity Center, IBM TotalStorage Productivity Center with Advanced Provisioning, and IBM TotalStorage Provisioning Manager. This easy-to-follow guide describes on demand provisioning for managing resources and information, as well as enhancing automation by explaining how these innovative offerings may improve client business. The book explains how to take storage management concepts to the next level, describing the architecture, components, and component interaction, explaining storage automation, and showing how to create high and low level workflows by using examples along with common storage management tasks. Narrated screen recordings in QuickTime format: IBM TotalStorage Productivity Center LaunchPad demonstration (26MB) IBM Tivoli TotalStorage Provisioning Manager Overview (62MB) IBM TotalStorage Productivity Center with Advanced Provisioning Workflow Case Study (66MB) Please note that the additional material referenced in the text is not available from IBM.

IBM Enterprise Workload Manager Release 1

This IBM Redbooks publication provides an introduction to the Enterprise Workload Manager (EWLM). In addition to describing the overall product concept and functionality, it presents a detailed discussion of the elements that are part of the solution.

Oracle Initialization Parameters Pocket Reference

Oracle designed its database products to be flexible and configurable so they would operate on a variety of hardware platforms, and they succeeded--Oracle software runs on more than seventy computer platforms, from mainframes to PC networks to handheld PDAs. The secret to this flexibility lies in the software's initialization parameters, whose numerous settings can be configured for top performance in countless environments. On the downside, however, improper settings can slow a system down; even grind it to a halt. And with so many parameters--which change from version to version of Oracle software--it's challenging for Oracle administrators to keep in mind the characteristics and optimal settings for each parameter.The Oracle Initialization Parameters Pocket Reference provides the crucial information you need to make key adjustments to your Oracle database. This concise guide is a mix of invaluable performance tips and a quick reference to Oracle's initialization parameters. The book describes each initialization parameter, indicates what category it's in--from auditing to multi-threaded server MTS--and whether it can be modified dynamically via the ALTER SESSION or ALTER SYSTEM command.In addition to the details about parameter characteristics and settings, you'll find performance tips, such as how the various parameters interact, and what the most advantageous settings are for different configurations. No other reference focuses exclusively on these initialization parameters--an absolute must for anyone working with an Oracle database.Presented in a handy, easy-to-use format, the Oracle Initialization Parameters Pocket Reference is a welcome alternative for anyone who's struggled to memorize the best configuration settings or gone back and forth to online resources, trying to figure out what works. O'Reilly's Pocket References put the information you need close at hand where you need it most. This guide will keep your Oracle databases operating at peak performance.

Say It With Charts Workbook

Hands-on tips for powerful presentations in this all-new companion to the bestselling Say It with Charts Through four editions, Gene Zelazny's classic how-to Say It with Charts has generated more than $1.5 million in revenues. Now, in the companion Say It with Charts Workbook, Zelazny shows you how to make even more of your visual communication skills, working "one-on-one" with you on how to masterfully use the latest techniques and tools to enliven every presentation. More than just a rote listing of techniques, Say It with Charts Workbook features performance-improving strategies and suggestions that will help keep both you--and, even more important, the audience--comfortable and at ease. Part refresher course, part workbook, part self-test, it arms you with: • Step-by-step instructions and guidelines • Performance-improving strategies and suggestions • Tactics for customizing graphics to specific audiences

Elasticity

Although there are several books in print dealing with elasticity, many focus on specialized topics such as mathematical foundations, anisotropic materials, two-dimensional problems, thermoelasticity, non-linear theory, etc. As such they are not appropriate candidates for a general textbook. This book provides a concise and organized presentation and development of general theory of elasticity. Complemented by a Solutions Manual and including MatLab codes and coding, this text is an excellent book teaching guide. - Contains exercises for student engagement as well as the integration and use of MATLAB Software - Provides development of common solution methodologies and a systematic review of analytical solutions useful in applications of engineering interest - Presents applications of contemporary interest

Microsoft® Access 2003 Forms, Reports and Queries

When it comes to job-productivity, we all want to be able to perform well, especially when it comes to challenging assignments. Anyone who works with Microsoft Access on a regular basis knows that this program can prove to be one of the most challenging. If you are looking for a way to get the most you can out of the primary Access tasks, Microsoft Access 2003 Forms, Reports and Queries is the learning tool that you need. Focusing only on the forms, reports and queries functions, this book provides you with practical know-how, real-world examples and techniques that you can put to use immediately. Learn to condense mountains of information into manageable molehills of useful knowledge, so that you can perform at your best!

Transition from PSSP to Cluster Systems Management (CSM)

This IBM Redbooks publication covers the process of converting a PSSP cluster to a CSM cluster. It examines the different tools, utilities, documentation and other resources available to help the system administrator move a system from PSSP to CSM. This book also makes recommendations about which procedures are most suitable for different types of customer environments (high performance technical computing, server consolidation, business intelligence, etc.) and points out the relative advantages and disadvantages of the different procedures, tools, and methods. Customers will use the working knowledge presented in this book to plan and accomplish the transition of their own clustered systems from PSSP to CSM. Are you using GPFS? This transition book covers a number of GPFS transition methods, each with its own recommendations, GPFS cluster types, advantages versus disadvantages, and step-by-step scenarios. It also shows a method of moving GPFS storage between two clusters, which could be used during hardware transition or upgrades.

Web Search Garage

Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, includes a special technical support section to teach you how to find the support solutions you need on the Internet. Web Search Garage Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions. Web Search Garage

Microsoft Office Access 2003 in a Snap

Microsoft Access is a database development and maintenance program, but it can be confusing when trying to learn how to complete the tasks required to create an application. Microsoft Access 2003 In a Snap can quickly show you how to complete a specific task in an easy-to-follow format complete with illustrated steps. Sections of the book are organized into task categories such as Table Creation, Queries and Form Design. Intended to keep you focused and on-target, this book does not spend time explaining database architecture or application design. If you are the casual Access user or if you use it in your day-to-day work life, this book is a great reference tool!

IBM eServer zSeries 990 (z990) Cryptography Implementation

The IBM z990 includes both standard cryptographic hardware and optional cryptographic features, to give flexibility and growth capability. IBM has a long history of providing hardware cryptographic solutions, from the development of Data Encryption Standard (DES) in the 1970s to delivering the only integrated cryptographic hardware in a server to achieve the US Government's highest FIPS 140-2 Level 4 rating for secure cryptographic hardware.

Linux on IBM eServer zSeries and S/390: Performance Toolkit for VM

This IBM Redbooks publication discusses Performance Toolkit for VM, a performance monitoring and analysis tool for z/VM. Derived from the earlier FCON/ESA product, Performance Toolkit for VM enables system administrators to collect and analyze VM performance data. Both real-time and history data can be processed by Performance Toolkit for VM, and it provides most of the functions that are available in Real Time Monitor (RTM) and Performance Reporting Facility (PRF). In this book, we present an overview of the functions and features of Performance Toolkit for VM. We show how to navigate through its major monitoring screens and configure it. We also describe configuration for monitoring remote z/VM systems. Using examples, we illustrate how to monitor your z/VM system to identify potential performance problems. Major performance factors for running Linux guests under z/VM are discussed.

XML Hacks

Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.