talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

615

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Securing Hadoop

"Securing Hadoop" provides a comprehensive guide to implementing and understanding security within a Hadoop-based Big Data ecosystem. The book explores key topics like authentication, authorization, and data encryption, ensuring you gain practical insights on how to protect sensitive information effectively and integrate security measures into your Hadoop platform. What this Book will help me do Understand the key security challenges associated with Hadoop and Big Data platforms. Learn how to implement Kerberos authentication and integrate it with Hadoop. Master the configuration of authorization mechanisms for a secure Hadoop ecosystem. Gain knowledge about security event auditing and monitoring techniques specifically for Hadoop. Get a detailed overview of tools and protocols to build and secure a Hadoop infrastructure effectively. Author(s) Sudheesh Narayan is an experienced professional in the fields of Hadoop and enterprise security. With years of expertise in designing and implementing secure distributed data platforms, Sudheesh brings practical insights and step-by-step solutions to Hadoop practitioners. His teaching approach is hands-on, ensuring readers can directly apply theoretical concepts to real-world scenarios. Who is it for? This book is ideal for Hadoop practitioners including solution architects, administrators, and developers seeking to enhance their understanding of security mechanisms for Hadoop. It assumes a foundational knowledge of Hadoop and requires familiarity with basic security concepts. Readers aiming to implement secure Hadoop systems for enterprise-level applications will find this book especially beneficial.

The Basics of Digital Privacy

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis! The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal use Real-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safe Written by author Denny Cherry, who teaches top security professionals how to protect huge databases of information Learn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data

Passwords & Internet Addresses Journal For Dummies

Keep track of your passwords and learn how to make them better You have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book solves the problem! It's more than just a logbook; it's loaded with advice on creating effective passwords, maintaining your privacy on Facebook and Twitter, protecting your financial records, using online "netiquette", and much more. It also provides lots of space to record important site names, URLs, and passwords, including space for new passwords when you have to change them! With this handy guide, you can keep them all straight and up to date. Offers tips on establishing user accounts, creating effective passwords, keeping your accounts secure, maintaining your privacy on social networking sites, and more Provides space to record the site name, URL, site functions, and up to 10 passwords for each account, allowing you to change passwords from time to time for greater security Passwords & Internet Addresses Journal For Dummies combines important tips about passwords with a way to organize your information and still keep it safe. Never lose or forget another password!

IBM Systems Director 6.3 Best Practices

This IBM® Redbooks® publication describes the positioning of the IBM Systems Director in the complete management range. It also compares the IBM Systems Director with the IBM Flex Systems Manager (FSM) and describes the environments for which each tool is best suited. This publication helps you plan, install, tailor, and configure the IBM Systems Director on different platforms. It contains information about required system resources and which network ports are used. It shows how to use the Workload Estimator to select the appropriate hardware for IBM Systems Director server and provides information about the IBM Systems Director Editions. Best practices are covered for the basic management tasks that are available in IBM Systems Director, including how to perform discovery; how to collect inventory on discovered resources; how to deploy agent, driver, and firmware updates; how to manage hardware events; and other miscellaneous tasks. An overview of best practices is provided for using IBM Systems Director VMControl™. Systems Director VMControl is a cross-platform product that assists you in rapidly deploying virtual appliances to create virtual servers that are configured with the operating system and software applications that you want. It also enables you to group resources into system pools, which enable you to centrally manage and control the different workloads in your environment. The following plug-in offerings are described: Energy monitoring and management features offered by IBM Systems Director Active Energy Manager™ along with the best practice, which needs to be followed in using the IBM Systems Director Active Energy Manager. The IBM AIX® Profile Manager is a tool that can help implement and monitor the security of all AIX servers in a production environment but also implement and monitor the system compliance of those AIX servers. Best practices and the most important questions to ask before creating Workload Partition Manager (WPAR) and WPAR Manager infrastructure. In addition, how you can manage and relocate WPARs using WPAR Manager graphical interface and the command-line interface. Network Control basic functionalities and how to plan for Network Control deployments and also a number of common scenarios with best practices. The IBM Systems Director Service and Support Manager describes how to set up and how to handle serviceable events. Best practices for the Storage Monitoring and Management capabilities offered by IBM Systems Director server. This book is for IBM IT specialists and IT architects, IBM Business Partners, and clients, who are utilizing or considering implementing IBM Systems Director.

Oracle Business Intelligence Discoverer 11g Handbook

Master Oracle Business Intelligence Discoverer 11g Provide secure, immediate access to critical business information from relational and multidimensional data sources across your organization. Oracle Business Intelligence Discoverer 11g Handbook shows you how to optimize this intuitive ad hoc query, reporting, analysis, and web publishing tool for maximum performance. Real-world examples illustrate the powerful analysis, security, and reporting capabilities. Enable business users at all levels to make faster, more-informed decisions with help from this Oracle Press guide. Configure and manage Oracle Business Intelligence Discoverer 11g Run functional queries using the Workbook Wizard Add sorts, calculations, percentages, totals, and parameters using Oracle Business Intelligence Discoverer Plus Format queries into well-organized reports with graphs, tables, titles, headers, and footers Perform data analysis--statistical, classification, deviation, trend, and aging Use Oracle Business Intelligence Discoverer Viewer 11g to analyze, format, export, e-mail, and print reports Manage integration with Oracle WebLogic Server Refine existing queries using interactive pivoting, drilling, and hyper-drilling Build effective conditions and refine parameters, calculations, sorting, and percentages Manage access and sharing rights, scheduling privileges, and user preferences Build an end user layer and a business area using Oracle Business Intelligence Discoverer Administrator Use Oracle Enterprise Manager's Fusion Middleware Control feature to manage Oracle Business Intelligence Discoverer settings and preferences Implement powerful analytic functions using templates

IBM Content Manager OnDemand Guide

This IBM® Redbooks® publication provides a practical guide to the design, installation, configuration, and maintenance of IBM Content Manager OnDemand Version 9.0. Content Manager OnDemand manages high-volume storage and retrieval of electronic statements and provides efficient enterprise report management. Content Manager OnDemand transforms formatted computer output and printed reports, such as statements and invoices, into electronic information for easy report management. Content Manager OnDemand helps eliminate costly, high-volume print output by capturing, indexing, archiving, and presenting electronic information for improved customer service. This publication covers the key areas of Content Manager OnDemand, some of which might not be known to the Content Manager OnDemand community or are misunderstood. The book covers various topics, including basic information in administration, database structure, storage management, and security. In addition, the book covers data indexing, loading, conversion, and expiration. Other topics include user exits, performance, retention management, records management, and many more. Because many other resources are available that address subjects on different platforms, this publication is not intended as a comprehensive guide for Content Manager OnDemand; rather, it is intended to complement the existing Content Manager OnDemand documentation and provide insight into the issues that might be encountered in the setup and use of Content Manager OnDemand.

IBM Virtualization Engine TS7700 with R3.0

This IBM® Redbooks® publication highlights TS7700 Virtualization Engine Release 3.0. It is intended for system architects who want to integrate their storage systems for smoother operation. The IBM Virtualization Engine TS7700 offers a modular, scalable, and high-performing architecture for mainframe tape virtualization for the IBM System z® environment. It integrates 3592 Tape Drives, high-performance disks, and a new disk cache subsystem into a storage hierarchy. This storage hierarchy is managed by robust storage management firmware with extensive self-management capability. It includes the following advanced functions: Policy management to control physical volume pooling Cache management Dual copy, including across a grid network Copy mode control The TS7700 Virtualization Engine offers enhanced statistical reporting. It also includes a standards-based management interface for TS7700 Virtualization Engine management. The new IBM Virtualization Engine TS7700 Release 3.0 continues the next generation of TS7700 Virtualization Engine servers for System z tape: IBM Virtualization Engine TS7720 Server Model VEB with 3956-CS9 and 3 TB disk drive modules (DDMs) IBM Virtualization Engine TS7740 Server Model V07 with 3956-CC9 with 600 GB DDMs These Virtualization Engines are based on IBM POWER7® technology. They offer improved performance for most System z tape workloads compared to the first generation of TS7700 Virtualization Engine servers. TS7700 Virtualization Engine Release 3.0 builds on the existing capabilities of the TS7700 family. It also introduces the following capabilities: Up to 4,000,000 logical volumes per grid domain Disk cache refresh utilizing 3956-CC9 for TS7740 Model V07 and 3956-CS9 for TS7720 Model VEB Virtualization Engines IPv4 or IPv6 support for customer network and IP Security for grid communication

Securing Your Mobile Business with IBM Worklight

The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle. This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives. The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it. This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®. This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.

Professional Hadoop Solutions

The go-to guidebook for deploying Big Data solutions with Hadoop Today's enterprise architects need to understand how the Hadoop frameworks and APIs fit together, and how they can be integrated to deliver real-world solutions. This book is a practical, detailed guide to building and implementing those solutions, with code-level instruction in the popular Wrox tradition. It covers storing data with HDFS and Hbase, processing data with MapReduce, and automating data processing with Oozie. Hadoop security, running Hadoop with Amazon Web Services, best practices, and automating Hadoop processes in real time are also covered in depth. With in-depth code examples in Java and XML and the latest on recent additions to the Hadoop ecosystem, this complete resource also covers the use of APIs, exposing their inner workings and allowing architects and developers to better leverage and customize them. The ultimate guide for developers, designers, and architects who need to build and deploy Hadoop applications Covers storing and processing data with various technologies, automating data processing, Hadoop security, and delivering real-time solutions Includes detailed, real-world examples and code-level guidelines Explains when, why, and how to use these tools effectively Written by a team of Hadoop experts in the programmer-to-programmer Wrox style Professional Hadoop Solutions is the reference enterprise architects and developers need to maximize the power of Hadoop.

Oracle Essentials, 5th Edition

Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracle’s product line, including its architecture, data structures, networking, concurrency, and tuning. Complete with illustrations and helpful hints, this fifth edition provides a valuable one-stop overview of Oracle Database 12c, including an introduction to Oracle and cloud computing. Oracle Essentials provides the conceptual background you need to understand how Oracle truly works. Topics include: A complete overview of Oracle databases and data stores, and Fusion Middleware products and features Core concepts and structures in Oracle’s architecture, including pluggable databases Oracle objects and the various datatypes Oracle supports System and database management, including Oracle Enterprise Manager 12c Security options, basic auditing capabilities, and options for meeting compliance needs Performance characteristics of disk, memory, and CPU tuning Basic principles of multiuser concurrency Oracle’s online transaction processing (OLTP) Data warehouses, Big Data, and Oracle’s business intelligence tools Backup and recovery, and high availability and failover solutions

Making Sense of NoSQL

Making Sense of NoSQL clearly and concisely explains the concepts, features, benefits, potential, and limitations of NoSQL technologies. Using examples and use cases, illustrations, and plain, jargon-free writing, this guide shows how you can effectively assemble a NoSQL solution to replace or augment the traditional RDBMS you have now. About the Technology About the Book If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model, this book is for you. Written in plain language suitable for technical managers and developers, and using many examples, use cases, and illustrations, this book explains the concepts, features, benefits, potential, and limitations of NoSQL. Making Sense of NoSQL starts by comparing familiar database concepts to the new NoSQL patterns that augment or replace them. Then, you'll explore case studies on big data, search, reliability, and business agility that apply these new patterns to today's business problems. You'll see how NoSQL systems can leverage the resources of modern cloud computing and multiple-CPU data centers. The final chapters show you how to choose the right NoSQL technologies for your own needs. What's Inside NoSQL data architecture patterns NoSQL for big data Search, high availability, and security Choosing an architecture About the Reader Managers and developers will welcome this lucid overview of the potential and capabilities of NoSQL technologies. About the Authors Dan McCreary and Ann Kelly lead an independent training and consultancy firm focused on NoSQL solutions and are cofounders of the NoSQL Now! Conference. Quotes Easily digestible, practical advice for technical managers, architects, and developers. - From the Foreword by Tony Shaw, CEO of DATAVERSITY Cuts through the jargon and gives you the information you need to know. - Craig Smith, Unbound DNA A concise yet thorough description of the many facets of NoSQL, from big data to search. - John Guthrie, Pivotal Brings common sense to the world of NoSQL. - Ignacio Lopez Vellon, Atos Worldgrid Get ahead of your peers ... fast-track to NoSQL now! - Ian Stirk, Stirk Consultancy, Ltd

IBM Business Process Manager Version 8.0 Production Topologies

This IBM® Redbooks® publication describes how to build production topologies for IBM Business Process Manager V8.0. This book is an update of the existing book IBM Business Process Manager V7.5 Production Topologies, SG24-7976. It is intended for IT Architects and IT Specialists who want to understand and implement these topologies. Use this book to select the appropriate production topologies for an environment, then follow the step-by-step instructions to build those topologies. Part 1 introduces IBM Business Process Manager and provides an overview of basic topology components, and Process Server and Process Center. This part also provides an overview of the production topologies described in this book, including a selection criteria for when to select a topology. IBM Business Process Manager security and the presentation layer are also addressed in this part. Part 2 provides a series of step-by-step instructions for creating production topology environments by using deployment environment patterns. This process includes topologies that incorporate IBM Business Monitor. This part also describes advanced topology topics. Part 3 covers post installation instructions for implementing production topology environments such as configuring IBM Business Process Manager to use IBM HTTP Server and WebSphere® proxy server. Please note that the additional material referenced in the text is not available from IBM.

Practical Anonymity

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing

Pro Oracle Database 12c Administration, Second Edition

Pro Oracle Database 12c Administration is a book focused on results. Author Darl Kuhn draws from a well of experience over a decade deep to lay out real-world techniques that lead to success as an Oracle Database administrator. He gives clear explanations on how to perform critical tasks. He weaves in theory where necessary without bogging you down in unneeded detail. He is not afraid to take a stand on how things should be done. He won't leave you adrift in a sea of choices, showing you three ways to do something and then walking away. Database administration isn't about passing a certified exam, or about pointing-and-clicking your way through a crisis. Database administration is about applying the right solution at the right time, about avoiding risk, about making robust choices that get you home each night in time for dinner with your family. If you have "buck stops here" responsibility for an Oracle database, then Pro Oracle Database 12c Administration is the book you need to help elevate yourself to the level of Professional Oracle Database Administrator. Covers multi-tenant container and pluggable database implementation and management Condenses and organizes the core job of a database administrator into one volume. Takes a results-oriented approach to getting things done. Lays a foundation upon which to build a senior level of expertise What you'll learn Create a stable environment consistent across all databases that you manage Manage pluggable and multi-tenant databases Take care of job #1: backing up, and then recovering when needed Manage users and objects, and the security between them Do battle with "large"—large databases and large objects Move and distribute data using Data Pump, materialized views, external tables Automate critical jobs and tackle database troubleshooting problems Who this book is for Pro Oracle Database 12c Administration is aimed at new database administrators who aspire to senior positions in which employers and customers trust you to work independently, and with a "buck stops here" attitude.

Database Cloud Storage

Implement a Centralized Cloud Storage Infrastructure with Oracle Automatic Storage Management Build and manage a scalable, highly available cloud storage solution. Filled with detailed examples and best practices, this Oracle Press guide explains how to set up a complete cloud-based storage system using Oracle Automatic Storage Management. Find out how to prepare hardware, build disk groups, efficiently allocate storage space, and handle security. Database Cloud Storage: The Essential Guide to Oracle Automatic Storage Management shows how to monitor your system, maximize throughput, and ensure consistency across servers and clusters. Set up and configure Oracle Automatic Storage Management Discover and manage disks and establish disk groups Create, clone, and administer Oracle databases Consolidate resources with Oracle Private Database Cloud Control access, encrypt files, and assign user privileges Integrate replication, file tagging, and automatic failover Employ pre-engineered private cloud database consolidation tools Check for data consistency and resync failed disks Code examples in the book are available for download

Implementing IBM InfoSphere BigInsights on IBM System x

As world activities become more integrated, the rate of data growth has been increasing exponentially. And as a result of this data explosion, current data management methods can become inadequate. People are using the term big data (sometimes referred to as Big Data) to describe this latest industry trend. IBM® is preparing the next generation of technology to meet these data management challenges. To provide the capability of incorporating big data sources and analytics of these sources, IBM developed a stream-computing product that is based on the open source computing framework Apache Hadoop. Each product in the framework provides unique capabilities to the data management environment, and further enhances the value of your data warehouse investment. In this IBM Redbooks® publication, we describe the need for big data in an organization. We then introduce IBM InfoSphere® BigInsights™ and explain how it differs from standard Hadoop. BigInsights provides a packaged Hadoop distribution, a greatly simplified installation of Hadoop and corresponding open source tools for application development, data movement, and cluster management. BigInsights also brings more options for data security, and as a component of the IBM big data platform, it provides potential integration points with the other components of the platform. A new chapter has been added to this edition. Chapter 11 describes IBM Platform Symphony®, which is a new scheduling product that works with IBM Insights, bringing low-latency scheduling and multi-tenancy to IBM InfoSphere BigInsights. The book is designed for clients, consultants, and other technical professionals.

IBM FileNet Content Manager Implementation Best Practices and Recommendations

IBM® FileNet® Content Manager Version 5.2 provides full content lifecycle and extensive document management capabilities for digital content. IBM FileNet Content Manager is tightly integrated with the family of IBM FileNet products based on the IBM FileNet P8 technical platform. IBM FileNet Content Manager serves as the core content management, security management, and storage management engine for the products. This IBM Redbooks® publication covers the implementation best practices and recommendations for solutions that use IBM FileNet Content Manager. It introduces the functions and features of IBM FileNet Content Manager, common use cases of the product, and a design methodology that provides implementation guidance from requirements analysis through production use of the solution. We address administrative topics of an IBM FileNet Content Manager solution, including deployment, system administration and maintenance, and troubleshooting. Implementation topics include system architecture design with various options for scaling an IBM FileNet Content Manager system, capacity planning, and design of repository design logical structure, security practices, and application design. An important implementation topic is business continuity. We define business continuity, high availability, and disaster recovery concepts and describe options for those when implementing IBM FileNet Content Manager solutions. Many solutions are essentially a combination of information input (ingestion), storage, information processing, and presentation and delivery. We discuss some solution building blocks that designers can combine to build an IBM FileNet Content Manager solution. This book is intended to be used in conjunction with product manuals and online help to provide guidance to architects and designers about implementing IBM FileNet Content Manager solutions. Many of the features and practices described in the book also apply to previous versions of IBM FileNet Content Manager.

MongoDB: The Definitive Guide, 2nd Edition

Manage the huMONGOus amount of data collected through your web application with MongoDB. This authoritative introduction—written by a core contributor to the project—shows you the many advantages of using document-oriented databases, and demonstrates how this reliable, high-performance system allows for almost infinite horizontal scalability. This updated second edition provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Ideal for NoSQL newcomers and experienced MongoDB users alike, this guide provides numerous real-world schema design examples. Get started with MongoDB core concepts and vocabulary Perform basic write operations at different levels of safety and speed Create complex queries, with options for limiting, skipping, and sorting results Design an application that works well with MongoDB Aggregate data, including counting, finding distinct values, grouping documents, and using MapReduce Gather and interpret statistics about your collections and databases Set up replica sets and automatic failover in MongoDB Use sharding to scale horizontally, and learn how it impacts applications Delve into monitoring, security and authentication, backup/restore, and other administrative tasks

MySQL Workbench: Data Modeling & Development

The only Oracle Press guide to MySQL Workbench explains how to design and model MySQL databases. MySQL Workbench Data Modeling and Development helps developers learn how to effectively use this powerful product for database modeling, reverse engineering, and interaction with the database without writing SQL statements. MySQL Workbench is a graphical user interface that can be used to create and maintain MySQL databases without coding. The book covers the interface and explains how to accomplish each step by illustrating best practices visually. Clear examples, instructions, and explanations reveal, in a single volume, the art of database modeling. This Oracle Press guide shows you how to get the tool to do what you want. Annotated screen shots demonstrate all interactions with the tool, and text explains the how, what, and why of each step. Complete coverage Installation and Configuration; Creating and Managing Connections; Data Modeling Concepts; Creating an ERD; Defining the Physical Schemata; Creating and Managing Tables; Creating and Managing Relationships; Creating and Managing Views; Creating and Managing Routines; Creating and Managing Routine Groups; Creating and Managing User & Groups; Creating and Managing SQL Scripts; Generating SQL Scripts; Forward Engineering a Data Model; Synchronize a Model with a Database; Reverse Engineering a Database; Managing Differences in the Data Catalog; Creating and Managing Model Notes; Editing Table Data; Editing Generated Scripts; Creating New Instances; Managing Import and Export; Managing Security; Managing Server Instances

A Practical Guide to Managing Reference Data with IBM InfoSphere Master Data Management Reference Data Management Hub

IBM® InfoSphere® Master Data Management Reference Data Management Hub (InfoSphere MDM Ref DM Hub) is designed as a ready-to-run application that provides the governance, process, security, and audit control for managing reference data as an enterprise standard, resulting in fewer errors, reduced business risk and cost savings. This IBM Redbooks® publication describes where InfoSphere MDM Ref DM Hub fits into information management reference architecture. It explains the end-to-end process of an InfoSphere MDM Ref DM Hub implementation including the considerations of planning a reference data management project, requirements gathering and analysis, model design in detail, and integration considerations and scenarios. It then shows implementation examples and the ongoing administration tasks. This publication can help IT professionals who are interested or have a need to manage reference data efficiently and implement an InfoSphere MDM Ref DM Hub solution with ease.