CRAIG MULLINS DB2 PDF

Craig Mullins. You may know Craig from his popular books: Db2 Developer’s Guide, 6th edition and Database Administration: The Complete Guide to DBA. Craig S Mullins is president & principal consultant of Mullins Consulting, Inc., is an IBM Information Champion, and an IBM Gold Consultant for DB2. Craig has. DB2 Developer’s Guide [Craig S. Mullins] on *FREE* shipping on qualifying offers. DB2 Developer’s Guide, Fourth Edition is completely revised.

Author: Kerr Akinogal
Country: Great Britain
Language: English (Spanish)
Genre: Education
Published (Last): 23 September 2007
Pages: 321
PDF File Size: 2.84 Mb
ePub File Size: 16.71 Mb
ISBN: 358-5-98649-798-8
Downloads: 71036
Price: Free* [*Free Regsitration Required]
Uploader: Zujora

And that means it is time to reflect on the past year — including all that we have accomplished and what is yet to be done. What type of data should be masked? First of all, there used to be a software company called Platinum Technology….

The data in the database must be correct and proper after the transaction executes. Read what the experts say about DB2 Developer’s Guide: Why is this so? Because the hashing algorithm will always generate the same number for the same input value you can be sure that referential constraints are taken care of.

All materialfiles, logos, dh2 trademarks within this site are properties of their respective fraig. First of all, there used to be a software company called Platinum Technology, Inc. Consider the following sequence of events: Additionally, crzig repeatability is good for testing code where the program contains processes for checking that values match.

When a transaction is rolled back, the data in the database will be restored to the original state before the transaction was started.

Craig Mullins

BCV5 uses hash functions that map an input value to a single numeric value see Figure 1. Cralg a quick post today to wish all of my readers in the US and everywhere, really a very Happy Thanksgiving.

  CE2354 ENVIRONMENTAL ENGINEERING II LECTURE NOTES PDF

Have you ever wanted to put together a presentation and rcaig. If you’ve bought a… Published and Available to be Ordered: Mullins, All Rights Reserved. All of the generated data is plausible, but not the real data. The number is calculated using the hashing algorithm, it is not a random number. Terms of Crig Privacy Policy Contact. Poor Masking versus Good Masking. Mullins’ new “DB2 Developer’s Guide. It is chock full of DB2 technical information, design and tuning approaches and database administration guidelines.

In other words, transactions exhibit ACID properties.

Craig S Mullins

Regular readers should have noticed that the logo and basic design of the blog has been “spiffed” up a bit. If Mullinns is your profession, this book belongs on your desk. But back to today’s topic Similar input values result in totally different generated values so the results are not predictable and the hashing function is designed to be non-invertible, so you cannot infer information about the original value from the generated kullins.

This information can be found in the Db2 Catalog. Data masking is an important component of building mmullins test bed of data — especially when data is copied from production.

Application programmers must understand how concurrency problems impact the access and modification of Db2 data. The book guides you through the major components and DB2 internals from a practitioner’s perspective.

To summarize, a transaction—when executed alone, on a consistent database—will either complete, producing correct results, or terminate, with no effect. Some data types, such as social security numbers or credit card numbers, can be generated directly from the seed value through mathematical operations.

That means no matter how many times you run mllins masking process you get the same mask values; the values are different than the production values, but they always match the same test values.

When using uncommitted reads, an application program can read data that has been changed, but not yet committed. Monday, November 12, Data Masking: Your webmaster has put past editions of this book to good use and considers the money well spent. Generally speaking, I think blogs are mostly for …. From the earliest days of the country until Lincoln, the date Thanksgiving was observed differed from st… Data Masking: An Imperative for Compliance and Governance For those who do not know, data masking is a process that creates structurally similar data that is not the same as the values used in production.

  LUCIAN JAMES MOLONEY PDF

However, it lacks the robust, repeatable nature for generating masked data that a tool like BCV5 can provide.

Craig S. Mullins – DB2 Developer’s Guide

ACID is an acronym for atomicity, consistency, isolation, and durability. Return to Home Page. And here is what that tip was: Because of the data integrity issues associated with dirty reads, DBAs should keep track of the programs that specify an isolation level of UR.

I did this because the blog has been around for a long time now Thursday, November 22, Happy Thanksgiving You should look to crig setting up poor data masking rules. Well, back in the day, Platinum was one of the most innovative marketers in the world of Db2, and they used to mail out a monthly tip about how mulkins use Db2 more efficiently. An Imperative for Compliance and Governance. A component of BCV5, known appropriately enough as The Masking Toolprovides a comprehensive set of data masking capabilities.

Have you worked on a cool application or figured out a nifty way of managing your databases?

Posted in Sex