Earlier this week I blogged about the TDD Workshop that Justin Gordon is running tomorrow (July 25) in Chicago: link. I have a recommended book list to go with this session:
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series) by Gerard Meszaros
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.
xUnit Test Patterns is the definitive guide to writing automated tests using xUnit, the most popular unit testing framework in use today. Agile coach and test automation expert Gerard Meszaros describes 68 proven patterns for making tests easier to write, understand, and maintain. He then shows you how to make them more robust and repeatable--and far more cost-effective.
Loaded with information, this book feels like three books in one. The first part is a detailed tutorial on test automation that covers everything from test strategy to in-depth test coding. The second part, a catalog of 18 frequently encountered "test smells," provides trouble-shooting guidelines to help you determine the root cause of problems and the most applicable patterns. The third part contains detailed descriptions of each pattern, including refactoring instructions illustrated by extensive code samples in multiple programming languages.
Topics covered include:# Writing better tests--and writing them faster# The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown# Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects# Designing software for greater testability# Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them# Refactoring tests for greater simplicity, robustness, and execution speed
This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. While the patterns and smells are especially applicable to all members of the xUnit family, they also apply to next-generation behavior-driven development frameworks such as RSpec and JBehave and to other kinds of test automation tools, including recorded test tools and data-driven test tools such as Fit and FitNesse.
Working Effectively with Legacy Code (Robert C. Martin Series) by Michael Feathers
Get more out of your legacy systems: more performance, functionality, reliability, and manageability
Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts.
In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control.
The topics covered include:# Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance# Getting legacy code into a test harness# Writing tests that protect you against introducing new problems# Techniques that can be used with any language or platform—with examples in Java, C++, C, and C## Accurately identifying where code changes need to be made# Coping with legacy systems that aren't object-oriented# Handling applications that don't seem to have any structure
This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. Next Generation Java Testing: TestNG and Advanced Concepts by Cédric Beust and Hani Suleiman
Enterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java™ Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing platform.
Cédric Beust, TestNG's creator, and leading Java developer Hani Suleiman, present powerful, flexible testing patterns that will work with virtually any testing tool, framework, or language. They show how to leverage key Java platform improvements designed to facilitate effective testing, such as dependency injection and mock objects. They also thoroughly introduce TestNG, demonstrating how it overcomes the limitations of older frameworks and enables new techniques, making it far easier to test today's complex software systems.
Pragmatic and results-focused, Next Generation Java™ Testing will help Java developers build more robust code for today's mission-critical environments.
This book: # Illuminates the tradeoffs associated with testing, so you can make better decisions about what and how to test# Introduces TestNG, explains its goals and features, and shows how to apply them in real-world environments# Shows how to integrate TestNG with your existing code, development frameworks, and software libraries# Demonstrates how to test crucial code features, such as encapsulation, state sharing, scopes, and thread safety# Shows how to test application elements, including JavaEE APIs, databases, Web pages, and XML files# Presents advanced techniques: testing partial failures, factories, dependent testing, remote invocation, cluster-based test farms, and more# Walks through installing and using TestNG plug-ins for Eclipse, and IDEA# Contains extensive code examples
Whether you use TestNG, JUnit, or another testing framework, the testing design patterns presented in this book will show you how to improve your tests by giving you concrete advice on how to make your code and your design more testable.
Test Driven: TDD and Acceptance TDD for Java Developers by Lasse Koskela
In test driven development, you first write an executable test of what your application code must do. Only then do you write the code itself and, with the test spurring you on, you improve your design. In acceptance test driven development (ATDD), you use the same technique to implement product features, benefiting from iterative development, rapid feedback cycles, and better-defined requirements. TDD and its supporting tools and techniques lead to better software faster.
Test Driven brings under one cover practical TDD techniques distilled from several years of community experience. With examples in Java and the Java EE environment, it explores both the techniques and the mindset of TDD and ATDD. It uses carefully chosen examples to illustrate TDD tools and design patterns, not in the abstract but concretely in the context of the technologies you face at work. It is accessible to TDD beginners, and it offers effective and less well known techniques to older TDD hands.
What's Inside:# Learn hands-on to test drive Java code# How to avoid common TDD adoption pitfalls# Acceptance test driven development and the Fit framework# How to test Java EE components-Servlets, JSPs, and Spring Controllers# Tough issues like multithreaded programs and data access code
Refactoring Databases: Evolutionary Database Design by Scott Ambler and Pramodkumar J. Sadalage
Refactoring has proven its value in a wide range of development projects–helping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques specifically designed for database systems.
Ambler and Sadalage demonstrate how small changes to table structures, data, stored procedures, and triggers can significantly enhance virtually any database design–without changing semantics. You’ll learn how to evolve database schemas in step with source code–and become far more effective in projects relying on iterative, agile methodologies.
This comprehensive guide and reference helps you overcome the practical obstacles to refactoring real-world databases by covering every fundamental concept underlying database refactoring. Using start-to-finish examples, the authors walk you through refactoring simple standalone database applications as well as sophisticated multi-application scenarios. You’ll master every task involved in refactoring database schemas, and discover best practices for deploying refactorings in even the most complex production environments.
The second half of this book systematically covers five major categories of database refactorings. You’ll learn how to use refactoring to enhance database structure, data quality, and referential integrity; and how to refactor both architectures and methods. This book provides an extensive set of examples built with Oracle and Java and easily adaptable for other languages, such as C#, C++, or VB.NET, and other databases, such as DB2, SQL Server, MySQL, and Sybase.
Using this book’s techniques and examples, you can reduce waste, rework, risk, and cost–and build database systems capable of evolving smoothly, far into the future.
Keep on Learning
Matching: books X
Carlton Doe's long awaited IDS book is near completion. It is so near completion that you can find it listed on amazon.com now... with a hefty pre-order discount:
Administering Informix Dynamic Server: Building the FoundationList Price: $59.95Price: $37.77 & this item ships for FREE with Super Saver Shipping. You Save: $22.18 (37%)
Carlton's previous published books, Informix Dynamic Server Handbook and Administering Informix Dynamic Server on Windows NT are 11 and 9 years old, respectively.
Except for the two "flashbooks" that Carlton published via IBM, no other IDS books have made it to the bookstores! You'll be happy to learn that there is a certification guide in the works as well as a possible second book from Carlton (with more advanced material).
Here is an online version of the first flashbook that introduced IDS 11: IBM Informix Dynamic Server 11: The Next Generation in OLTP Data Server Technology. The second smaller one that introduced 11.5 will be available for free at the IOD Conference.
What's in the new book:
Geared towards database server administrators who need to get a server up and running in a short amount of time, this guide focuses on the basic skills required to administer and maintain the Informix Dynamic Server (IDS) data server. Each of the major functional areas of the database server are reviewed, including designing, initializing, monitoring, building availability layers, securing data, and the data processing environment. This book reviews how the IDS works, how to install it, how to configure a database environment, back up, recovery, and includes an introduction to monitoring instance operations, making it useful to current IDS users who need to upgrade from earlier versions of the data server as well as those who have never used IDS before.
Table of Contents:Chapter 1 – Introduction to Informix Dynamic ServerThis chapter covers the general design of the IDS data server. Terms and keywords used extensively throughout the rest of the book are introduced and defined here.
Chapter 2 – An Introduction to ExtensibilityThis chapter explores the object-relational features and capabilities of Informix Dynamic Server.
Chapter 3 – Preparing for InitializationIn this chapter, Carlton covers many of the topics you need to address from a design perspective when planning for the implementation of an IDS environment. For the most part, the discussion is general in scope because there are few hard and fast rules to follow when building a database environment. Where rules do exist, they are stated. At the close of the chapter, Carlton explains the required environment variables, files, and other objects as well as how to set them up.
Chapter 4 – Installing and Initializing IDSThis chapter covers all the steps and configuration parameters for creating an IDS database environment or instance, with specific recommendations given for the most critical configuration parameters. At the end, Carlton introduces the system-level databases that manage and control an IDS environment.
Chapter 5 – Basic Administrative TasksIn this chapter, Carlton explains most of the general day-to-day, or occasional, instance-oriented administrative tasks. These include adding or dropping disk space, starting up or shutting down the instance, and killing user sessions in the instance. The major graphical administration tools are introduced as an alternative to performing many of these tasks using the command line.
Chapter 6 – Building a Database EnvironmentIn this chapter, Carlton trades his DSA’s hat for that of a DBA and covers building and populating databases in IDS instances. The chapter explains features such as table and index partitioning, constraints, logging, database and table population utilities, and a collection of IDS-specific SQL statements that Carlton thinks are interesting to know about and use.
Chapter 7 – Backing Up and RestoringOne of the least glamorous, but still important, functions of operating a database environment is backing up what’s on disk to tape. In this chapter, Carlton covers a couple of backup strategies and their relative strengths and weaknesses. He explains how Informix Dynamic Server can execute moment-in-time backup and restore operations with the database environment online and fully functioning. The process of executing backup and restore operations using the ontape utility, as well as the ON-Bar utility suite in conjunction with the Informix Storage Manager (ISM), is covered in great detail.
Chapter 8 – Monitoring the InstanceThroughout the book, discussions make reference to, and include illustrations of, output generated by the various IDS monitoring commands. In this chapter, Carlton focuses exclusively on those commands and some of the more commonly monitored activities of a database environment. He concentrates primarily on IDS’s command-line utilities as well as the functionality available in the new OpenAdmin Tool for IDS (OAT).
For those of you who don't know Carlton, here's his bio and website:
Carlton Doe is one of the five founders of the International Informix Users Group (IIUG) and has served as the IIUG president. He is the author of Administering Informix Dynamic Server on Windows NT and Informix: OnLine Dynamic Server Handbook. He lives in Dallas, Texas.
Congratulations Carlton! The entire IDS community will be proud of this book!
Just published: Cognos 8 Business Intelligence: The Official Guide by Dan Volitich .
This is the only authorized guide to IBM Cognos 8 Business Intelligence.
Develop, deploy, and maintain a complete BI solution across your enterprise. IBM Cognos 8 Business Intelligence: The Official Guide shows you how to take full advantage of the robust service-oriented architecture and simplified role-based user interfaces. Learn how to create, share, and analyze data-rich reports that lead to increased productivity and better business decisions. Featuring real-world insight and expert tips, this is a must-have guide for IBM Cognos 8 Business Intelligence users of all levels, from administrators to end users.
* Measure and monitor performance using dashboards and scorecards * Assign user roles and privileges * Provide complete and consistent access to a broad range of data sources via Cognos Connection* Use Cognos 8 Go! to extend BI to Office applications, mobile devices, and search engines* Enable business users to create reports with Query Studio* Develop new insights by exploring data in multiple dimensions and perspectives with Analysis Studio* Build Dimensional Reports with Report Studio* Use Event Studio to identify and deliver mission-critical information * Create, modify, organize, and publish a model from Cognos Framework Manager * Implement sound security measures * Take advantage of the management tools in Cognos Administration to ensure maximum reliability and availability
When at the IOD EMEA Conference last month, I had many requests for this book, but unfortunately it had not yet been released in Europe. Here are some options for buying the book:
1. For Canada/Canadians – mcgrawhill.ca 2. All other, USA & Intl etc – mhprofessional.commhprofessional.com 3. For Cognos employee purchases, contact me directly for information.
A new ILO course has just been added. This one is an SQL workshop that is spread over 4 half-days in two weeks. ILO courses are the IBM courses that you take without traveling by joining a remote instructor via your computer.
Here are some details:
SQL Workshop - Multi Week Instructor Led Online
On completion of this course, you should be able to:
* Code SQL statements to retrieve data from a DB2 or Informix table, including the SELECT, FROM, WHERE, GROUP BY, HAVING and ORDER BY clauses* Code inner joins and non-correlated subqueries* Use SQL arithmetic operations* Use scalar and column functions* Use UNION and UNION ALL* INSERT, UPDATE and DELETE rows* Code simple CREATE TABLE and CREATE VIEW statements
The DB2 books that you may wish to have to complement this course are:
* Understanding DB2(R): Learning Visually with Examples (2nd Edition)* DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition)
If you are interested in passing the DB2 9 Family Fundamentals certification exam (Test 730), you should notice that about 23% of the exam covers SQL knowledge. The book DB2 9 Fundamentals Certification Study Guide by Roger Sanders corresponds to the exam objectives and therefore covers the SQL that you need to pass the exam.
An interesting way to get a start on learning SQL is through the DB2 Games. Here are some details that I found on Kate Dawson's blog:
If you are a beginner, choose the IBM DB2 Detective GameIf you like watching crime investigation shows, this might just be the perfect game for you. Using a crime investigation theme, you will enforce your DB2 9 and SQL skills while learning relational database concepts and how they can be applied to real-life problems. I’ve played this game and highly recommend it.
If you have some existing DB2 skills, choose the IBM DB2 Business GameTry a “run your own business” scenario and put your DB2 and SQL skills to the test with the Business Game. Your company’s future depends on a key report needed to secure funds for a critical upgrade… can you put your DB2 skills into action and beat the game? Play now and find out.
Whenever I ask people who are SQL experts, they tell me that they rely heavily on these books:
* Graeme Birchall's DB2 SQL Cookbook* The SQL Reference for Cross-Platform Development* Product Docs for DB2 LUW* Product Docs for DB2 z/OS
When at conferences, I've noticed that the following books are popular:* Joe Celko's SQL for Smarties: Advanced SQL Programming Third Edition* SQL Demystified* SQL: The Complete Reference, Second Edition* SQL In A Nutshell, 2nd Edition* SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)* SQL Pocket Guide
In writing this blog I realize how many resources are available for SQL. Clearly that means that it is a very important topic.... and one that you can continue to improve in.
I use google to find links to just about anything I'm interested in. I'm not always successful in finding what I am looking for, but I'm sure it is just because of my bad search arguments.
Mark Wilding, a member of the Toronto Lab Development team, was looking for DB2 sites and was frustrated at not being able to find what he wanted to. So, always a problem solver... Mark created the following site:
Forever growing, this site should be one of the first places to go if you are looking for specific DB2 information.
Just a quick comment about Mark. Mark is one of the many prolific authors that we seem to attract in the Toronto Lab. He's been involved with a few books with many ideas still unpublished. He was the driving force behind the latest DB2 Best Practices initiative. If you don't know about this yet, check out the bookmark list to find it.
Also, Mark, along with Dan Behman, wrote a book about Linux that should be popular with many people: Self-Service Linux(R): Mastering the Art of Problem Determination .
Thanks Mark for the bookmark list as well as your passion for writing!
You may have taken part in this survey of IDUG members on the topic of evolving roles and eduction / training needs. I can't say that the results are unexpected, but I can say that it is very helpful to see the analysis and results as they are discussed in the final survey report, "Data Professionals Broaden Their Skills,". The document is currently posted on IDUG's Web site and can be downloaded free-of-charge.
IDUG partnered with Unisphere Media to conduct the survey of IDUG members on this important topic. Sponsored by CA, the survey gathered input from more than 850 data professionals, with some enlightening results that will help IDUG further serve your needs.
From a publishing perspective, I was encouraged to see that many of the books that are currently available, along with those that are in the works, meet the needs of most of the respondents.
For example, it was mentioned several times in the document that DBAs need the following types of information: database performance and tuning, SQL performance, backup and recovery, and data availability. The recently published book by George Baklarz and Paul Zikopolous, DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition) covers all of the topics and confirms to me that this book is the must have book for all DBAs! The upcoming book by Roger Sanders and Dwaine Snow, DB2 9 for Linux, UNIX, and Windows Advanced Database Administration Certification: Certification Study Guide will make an excellent companion book for this audience as it may go into more depth on some of the topics mentioned.
The document also mentioned that more DBAs are finding the need to perform application development tasks such as SQL statement development, data modeling and design, and data access methods. In addition to the Baklarz/Zikopolous book already mentioned, you should consider the book by Philip Gunning: DB2 9 for Developers . As the title implies, the book covers the application development tasks that a DBA is required to perform.
Always an important topic is database security: "Forty-one percent reported their time engaged in data security activities has grown over the past year. Most activity in this area has been focused on access control and user authentication, and managing users, roles and permissions." I would recommend the following book: Understanding DB2 9 Security by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, and Yuk-Kuen Henry Chan
Certification was also mentioned in the survey results, but the message was: "Certification, while valuable, is only prevalent at a minority of sites, the survey found. About 47 percent of respondents - the largest segment - said a quarter or fewer of staff members are certified or working toward certification. Another 21 percent have no certified staff at all." I found this to be surprising as certification exams are extremely popular with the IDUG conference attendees. The books that support our certification program are: DB2 Certification Study Guides.
Lastly I found the difference between database consultants and database administrators interesting: "The priorities of respondents who spend most of their time in business consulting-related activities differ sharply from those mainly engaged in traditional database administration. While both types of data professionals are likely to be focused on managing explosive data growth, data managers engaged in business consulting are far more likely than traditional database administrators to be focusing on developing service-oriented architectures (34 percent versus 18 percent). Likewise, respondents engaged in business consulting roles are more likely to be moving forward business intelligence initiatives (33 percent versus 18 percent). Enterprise information integration is also more of a top concern among professionals engaged with the business (31 percent versus 21 percent)."
For this audience, I'd highly recommend the growing list of SOA titles from IBM Press, especially Enterprise Master Data Management: An SOA Approach to Managing Core Information which I was closely involved with.
I encourage everyone to read and interpret the results from this survey for themselves. The document is 23 pages in length and worth the time to read.
One of the things that I'm trying to find out this year is where do people normally buy their books... and why. It seems that most people go to amazon.com. I go to amazon.com, but only to see the prices, selection, and reader comments. I typically buy at one of the local online bookstores such as amazon.ca or chapters.indigo.ca.
During my travels in the past month, I've found out that many people in Europe choose to buy directly from amazon.com rather than their local sites. Why? I think primarily because of the very favourable currency exchange... and also the price, selection and reader comments!
If you look at the bookstore site that my team maintains, we also point to amazon for the books that we mention. Not really to say that you should buy it there, but for you to see the price and the reader comments.
Since I work directly with several publishers, I also work directly with them on various book promotions. If there is a special discount promotion available for a book... I make sure that the details are mentioned on our bookstore site. For instance, next week you'll see the following information posted:
Enterprise Master Data Management: An SOA Approach to Managing Core Information
Save 35% on the new MDM book published in June that is sure to be the only complete technical primer for every MDM planner and implementer! Written by a team of 6 authors, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Save 35% with the following code at checkout:Coupon Code: IBM6250Active until 12/31/08
We've also arranged for people to buy IBM Press books direct from the publisher in Europe and Canada as well. Here are the sites:Pearson Canada - for a 35% discount on all featured books.Pearson EMEA - provides free shipping and duty for EMEA residents.Employees in Canada - contact me directly :)
For all other places in the world, international information is placed on this page: International sites
We now have many books available through MC Press as well. In the US, the recommended site is: MC Press Online. MC Press has published all of the DB2 V9 Certification Study Guides and have the long awaited Advanced DBA Study Guide coming in September. When MC Press has preorder information, it will be posted on our bookstore site.
In India, Shroff Publishers & Distributors Pvt. Ltd or Computer Bookshop. I see some IBM Press books on the Computer Bookshop site as well. Check it out and let me know if the prices are good!
I've mentioned Kindle before... If you have amazon's electronic reader, then you will be happy to note that all IBM books are kindle-ready! What a better way to have all the reference materials in a single place?
IBMers are encouraged to use Books 24x7 for electronic access to most retail books. All IBMers, worldwide, have access to Books 24x7. If you need info, let me know. If you don't work for IBM, you can pay for a subscription to either Books 24x7 or Safari for electronic books. You can read entire books electronically... or search a library of books for just the right topic.
I know I wasn't able to cover all the countries in the world. I'm still doing research! If you can help me by enlightening me on how you buy your books, please send me a comment! I'd love to hear from you!
As always, check out other bloggers via Planet DB2
Here is another IBM commercial. This one is called "The Grail" and is about security. Have you seen this IBM Press book that published earlier this year? It's about security as well....
Mainframe Basics for Security Professionals: Getting Started with RACF
Leverage Your Security Expertise in IBM® System z™ Mainframe Environments
For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments.
Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos.
The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments.
* Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation* Creating, modifying, and deleting users and groups* Protecting data sets, UNIX file system files, databases, transactions, and other resources* Manipulating profiles and managing permissions* Configuring the mainframe to log security events, filter them appropriately, and create usable reports* Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them* Creating limited-authority administrators: how, when, and why
About the Authors:
Ori Pomerantz has been securing computer networks--and teaching other people to do so--since 1995. Since joining IBM in 2003, he has written classes on several Tivoli® security products, including IBM Tivoli zSecure.
Barbara Vander Weele, a software engineer at IBM, has developed and presented education material on provisioning, security, storage, and business technologies for IBM Worldwide Education.
Mark Nelson, Senior Software Engineer at IBM, is a twenty-year veteran of the RACF design team and a frequent speaker on RACF and z/OS security-related topics.
Tim Hahn, IBM Distinguished Engineer, has been with IBM for seventeen years. He is Chief Architect for Secure Systems and Networks within the IBM Software Group Tivoli organization.
Security doesn't exist in a vacuum; it’s a part of the business process and it permeates all aspects of information technology. The bad news is that as applications run on a combination of multiple platforms, each of the platforms needs to be examined, understood, and protected. The good news is that good security techniques transcend platforms; the key is understanding how to take the knowledge that you already know and apply it across these platforms.
That's the reason for this book. Experienced UNIX or Windows security professionals can extend their existing security knowledge to the world of z/OS![Read More]
Another commercial for you to view: Killer App. This one was from last year.... and the closing remark: "I don't know how to do that." I think MDM is "how you can do that" and is the answer to connecting everything to everything... the power is amazing.
Learn how: preorder Enterprise MDM - An SOA Approach to Managing Core Information.
This is valuable reading for everyone who wants to understand MDM.
- - -
Product Description: The Only Complete Technical Primer for Every MDM Planner and Implementer
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The “lifeblood” master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data and maximize its value in SOA environments.
Now, for the first time, there’s an authoritative, vendor-independent MDM technical reference for every practitioner: architects, technical analysts, consultants, solution designers, and senior IT decision-makers. Authored by the IBM data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else--everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
• How MDM and SOA complement each other• Using the MDM Reference Architecture to position and design MDM solutions within an enterprise• Assessing the value and risks to master data, and applying the right security controls• Utilizing PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges• Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints• Leveraging master data as an enterprise asset—bringing people, process, and technology together with MDM and data governance• Identifying user roles, responsibilities. and skill descriptions for MDM project participants• Case studies in MDM deployment, including data warehouse and SAP integration
About the Authors: * Allen Dreibelbis, Executive Architect in the IBM Software Group Worldwide Information Platform and Solutions Architecture Team, led the development of the MDM Reference Architecture.
* Eberhard Hechler, Technical Enablement Architect for IBM Information Platform & Solutions, works with system integrators throughout Europe.
* Ivan Milman, Senior Technical Staff Member at the IBM Software Group and IBM Master Inventor, focuses on security and governance in information management.
* Martin Oberhofer, Technical Consultant at the IBM Böblingen Lab, is a member of the Worldwide IBM Software Group Master Data Management Center of Excellence.
* Paul van Run, IBM Senior Technical Staff Member, is responsible for architecting the MDM Server and WebSphere Product Center.
* Dan Wolfson is an IBM Distinguished Engineer and Chief Architect/CTO for the Information Platform and Solutions segment of the IBM Information Management Division of the IBM Software Group.
If you are attending the IBM Information On Demand EMEA Conference 2008 meet all six authors in person and have a copy of your book signed.
The book DB2 9 for Linux, UNIX, and Windows Advanced Database Administration Certification: Certification Study Guide by Roger Sanders and Dwaine Snow is going through its final tech review right now.... and the reviewers are loving the book! Order your copy now... amazon.com is offering a 37% discount for pre-orders.
This new book is essentially an update to the very successful book that was published to support DB2 V8: Advanced DBA Certification Guide and Reference for DB2(R) Universal Database v8 for Linux, UNIX, and Windows by Dwaine Snow and Thomas Phan.
1) We changed publishers... This book will join the series of V9 study guides published by MC Press. These books are very successful and are excellent resources to prepare people for the V9 cert exams.
2) We changed one of the authors: Roger Sanders teamed with Dwaine Snow... so together they bring their talents to this one book. Roger with his amazing writing skill and the creator of the study guide format that you will recognize throughout his books.... and Dwaine for his deep technical knowledge in the advanced DBA area.
3) Sample questions were added that are similar to the actual exam... along with explanations for the correct answers.
What's the same?
1) Much of Dwaine's content is the similar to the old book... and if the exam doesn't cover certain topics, the content has been included in an appendix of the new book.
2) The first book had 14 5-star reviews... and one 4-star review. Of course there are no reviews of the new book yet... but I'm asking the reviewers to give their feedback so you can see it.
It seems to me that every newsletter I get these days has at least one article about security / data protection. Here are a few of the headlines that I've noticed:
* Don't Tolerate Liberal Data Permissions* What Is All This Integrity Business?* How to get employees passionate about disaster recovery * Backups: Understanding How Performance Matters* Top 10 Security Trends for 2008* Learn Best Practices for Database Auditing
Yesterday I was sent this information regarding data security problems that I'd like to share with you:
* Is your DB2 audit reporting strategy lacking institutional controls, or perhaps even nonexistent? * Are you using "live" production data for unit testing, with no masking of sensitive data values? * Are you wasting resources storing large amounts of unreferenced and inactive data on your operational databases? * Is sensitive data potentially being exposed to theft while at rest or in transit between you and your business partners?
The DB2 and IMS solution can help minimize the liability risk associated with Data Governance.
Data Server Security BlueprintThis blueprint provides a threat-focused security framework for users of IBM Data Servers (whether DB2 for LUW, DB2 for z/OS or IDS) and our related data governance Tools that help them understand how our products work together to solve their data security problems. It is comprehensive enough to cover all the major threats, yet simple enough for a new DBA to pick up and use immediately. From this site, download the white paper and the blueprint.
On April 1, there was a Chat with the Lab regarding this blueprint. From this site you can download the charts and at some point in the near future, you'll be able to listen to a replay of the chat.
And last but not least, we have several books that are current and cover these topics to some degree. In particular Understanding DB2 9 Security by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan.
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
DBA Central on developerWorks has a list of the most recent articles, and you'll find several related to the security topic that may be useful to you as well.
Over the past year I have been working with a geographically dispersed author team who have been writing a book to explain the meaning of Master Data Management to the world! I'm happy to say that the book is now ready for you to preorder... delivery in June.
Enterprise Master Data Management: An SOA Approach to Managing Core Information by Allen Dreibelbis, Eberhard Hechler, Ivan Milman, Martin Oberhofer, Paul van Run, and Dan Wolfson.
As a favour to the authors, I read the majority of the book in order to give feedback on what was written. I found the book very informative and for a complete newbie like me... I found it understandable and can see the potential for every company in the world to want to have MDM!
Dr. Ambuj Goyal wrote the foreword for the book, and I am copying a piece of it here so that you can get a glimpse into the importance of the topic and the book... from an expert who knows what he's talking about:
Unlocking information and letting it flow rapidly and easily to the people and processes that need it, is easier said than done. Over the past 20 years or more, the IT industry has focused on automating business tasks. This has created a very complex information landscape; individual automation projects have led to disconnected silos of information. Little trusted information exists – there are multiple versions of the truth. Redundancy reigns – both logically and physically. Few common definitions of key data elements exist or are shared across the enterprise. No common processes to manage and ensure the integrity of critical data domains exist. These facts define today’s environment. They blind the business from the information it needs, add cost to the IT infrastructure, and slow the ability of the business to move forward with confidence. Solving these problems is what Master Data Management and this book are all about.
The book is written in a generic way so that any one who is considering implementing an MDM system will benefit from reading it. Now the author team is committed to writing about how to implement the solution using IBM technology, and they've just published their first article with many more to come: Implementing a transaction hub MDM pattern using IBM InfoSphere Master Data Management Server
Synopsis of the article: Learn to use the transaction hub Master Data Management (MDM) pattern to implement your MDM systems. This typical architectural pattern is described in terms of capabilities of the MDM Reference Architecture. Get an introduction to the IBM® InfoSphere™ MDM Server and see why this software solution is a good choice for implementing this architecture pattern. Finally, learn about an upcoming book, Enterprise Master Data Management: An SOA Approach Managing Core Information, that deals with these topics in greater detail.
Join us at the IBM Information On Demand EMEA Conference 2008 taking place June 3 - 6, 2008 The Hague, Netherlands. Enterprise Master Data Management: An SOA Approach to Managing Core Information is being launched at this conference and we've arranged for an author signing. I've been told that there are quite a few sessions related to MDM taking place at this conference, so for multiple reasons, this is the place to be!
Thanks to the authors for the tremendous dedication that they have to this topic and for the incredible work they put into creating this book.
Can you believe it? March ends next Monday. Is it just me or was this the fastest moving first quarter ever!
Don't miss out on these special book prices that are offered by publishers MC Press and Pearson Education (IBM Press titles). The prices for the books at MC Press end March 31. I can't find details for when the IBM Press sale ends, but vaguely remember a March date as well. I'll confirm. But in the meantime, here are the details:
Save 37% on the purchase of DB2 9 for Developers by Philip K. Gunning. See also my blog entry about this book and sale.or go directly to the publisher's page.
While looking at the entry for Phil's book, I came across MC Press's Scratch and Dent Sale. Although there aren't any DB2 books listed in this sale, the prices are very good for Java, WebSphere, Elipse, and Rational titles.
See my blog entry about the Pearson Education sale of 35% off selected titles or go directly to the offer.
Books that are part of the IBM Press offer include:
* DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep, 6th Edition* Understanding DB2®: Learning Visually with Examples, 2nd Edition* Understanding DB2 9 Security* DB2® SQL PL: Essential Guide for DB2® UDB on Linux™, UNIX®, Windows™, i5/OS™, and z/OS®, 2nd Edition* Introduction to IMS™, An: Your Complete Guide to IBM's Information Management System* Mining the Talk: Unlocking the Business Value in Unstructured Information* Implementing ITIL Configuration Management* Practical Guide to Trusted Computing, A* Mainframe Basics for Security Professionals: Getting Started with RACF* Developing Quality Technical Information: A Handbook for Writers and Editors, 2nd Edition
Another classic IBM Press title is An Introduction to IMS by Dean Meltz, Rick Long, Mark Harrington, Robert Hain, and Geoff Nicholls
I love this quote that Dean Meltz has as his signature line in his emails:
Do you bank? Do you use ATMs? Do you use the internet? Then you've used IMS. Nothing has ever compared to the reliability and speed of IMS.
This book was published in 2005 and provides the insights and skills you need to succeed--as an application designer, developer, or administrator. I've been told that there are still quite a few older installations of IMS. This book is critical for the people working with the older version and can help you understand why an upgrade is desirable and will help you to understand the latest features.
This book is one of the featured titles that Pearson Education is offering to you at a 35% discount:
Introduction to IMS™, An: Your Complete Guide to IBM's Information Management System
* List Price: $69.99 * Your Price: $45.49 (Save 35%)
Maybe it's a bit sad that in the book world, a book that was published in 2004 is considered a classic! But with the number of new books being published on a daily basis... such is life!
Developing Quality Technical Information: A Handbook for Writers and Editors (2nd Edition) by Gretchen Hargis, Michelle Carey, Ann Kilty Hernandez, Polly Hughes, Deirdre Longo, Shannon Rouiller, and Elizabeth Wilde.
I have this book on my desk and think fondly of the team of people who wrote the book. Seven talented women from IBM wrote the book using their collective years of skill that they built working in Information Development. Sadly, Gretchen is no longer with us and several of the other authors have since retired from IBM. But, we can still benefit from their learned experience.
The book was so well-written that amazon displays 20 reader comments... most of them four or five star reviews! I recently went back to the author team to ask whether an update was needed. The answer came back... NO. The content is still very relevant and useful to anyone who is writing or reviewing technical content.
Who is writing technical content these days? I would have to say... just about everyone! Yes, the talented people working on the Information Development team are the leading contributors as they write the product docs, online help, and more. But... I write a blog, friends of mine write articles, tutorials, white papers, and IBM Redbooks. I work with many technical people and ask them to write books.... or chapters of books. Not many of these people took actual training to write about technical subjects, so this is very much a skill that people build over a number of attempts via trial and error, repeated writing, and learning from reviews.
I also ask many people to review chapters of books before they are published. Developers working on IBM are constantly asked to review documents to ensure that they are technically accurate. For that matter, developers are required to write technical specs before they design and code.
So, really the answer is just about everyone is required to write or review as part of their technical career. Do you feel qualified? Help yourself... and increase the quality of your work, with the help of this book. It is one of the books that I'll forever be proud to be part of... in the small way that I was.
Read the customer comments on amazon regarding this book, and take advantage of the 35% discount you can get when buying this book directly from the publisher.
Developing Quality Technical Information: A Handbook for Writers and Editors, 2nd Edition
* List Price: $49.99 * Your Price: $32.49 (Save 35%)