Craig Mullins. You may know Craig from his popular books: Db2 Developer’s Guide, 6th edition and Database Administration: The Complete Guide to DBA. Craig S Mullins is president & principal consultant of Mullins Consulting, Inc., is an IBM Information Champion, and an IBM Gold Consultant for DB2. Craig has. DB2 Developer’s Guide [Craig S. Mullins] on *FREE* shipping on qualifying offers. DB2 Developer’s Guide, Fourth Edition is completely revised.
|Published (Last):||23 September 2007|
|PDF File Size:||2.84 Mb|
|ePub File Size:||16.71 Mb|
|Price:||Free* [*Free Regsitration Required]|
And that means it is time to reflect on the past year — including all that we have accomplished and what is yet to be done. What type of data should be masked? First of all, there used to be a software company called Platinum Technology….
The data in the database must be correct and proper after the transaction executes. Read what the experts say about DB2 Developer’s Guide: Why is this so? Because the hashing algorithm will always generate the same number for the same input value you can be sure that referential constraints are taken care of.
All materialfiles, logos, dh2 trademarks within this site are properties of their respective fraig. First of all, there used to be a software company called Platinum Technology, Inc. Consider the following sequence of events: Additionally, crzig repeatability is good for testing code where the program contains processes for checking that values match.
When a transaction is rolled back, the data in the database will be restored to the original state before the transaction was started.
BCV5 uses hash functions that map an input value to a single numeric value see Figure 1. Cralg a quick post today to wish all of my readers in the US and everywhere, really a very Happy Thanksgiving.
In other words, transactions exhibit ACID properties.
Craig S Mullins
Regular readers should have noticed that the logo and basic design of the blog has been “spiffed” up a bit. If Mullinns is your profession, this book belongs on your desk. But back to today’s topic Similar input values result in totally different generated values so the results are not predictable and the hashing function is designed to be non-invertible, so you cannot infer information about the original value from the generated kullins.
This information can be found in the Db2 Catalog. Data masking is an important component of building mmullins test bed of data — especially when data is copied from production.
Application programmers must understand how concurrency problems impact the access and modification of Db2 data. The book guides you through the major components and DB2 internals from a practitioner’s perspective.
To summarize, a transaction—when executed alone, on a consistent database—will either complete, producing correct results, or terminate, with no effect. Some data types, such as social security numbers or credit card numbers, can be generated directly from the seed value through mathematical operations.
That means no matter how many times you run mllins masking process you get the same mask values; the values are different than the production values, but they always match the same test values.
When using uncommitted reads, an application program can read data that has been changed, but not yet committed. Monday, November 12, Data Masking: Your webmaster has put past editions of this book to good use and considers the money well spent. Generally speaking, I think blogs are mostly for …. From the earliest days of the country until Lincoln, the date Thanksgiving was observed differed from st… Data Masking: An Imperative for Compliance and Governance For those who do not know, data masking is a process that creates structurally similar data that is not the same as the values used in production.
However, it lacks the robust, repeatable nature for generating masked data that a tool like BCV5 can provide.
Craig S. Mullins – DB2 Developer’s Guide
ACID is an acronym for atomicity, consistency, isolation, and durability. Return to Home Page. And here is what that tip was: Because of the data integrity issues associated with dirty reads, DBAs should keep track of the programs that specify an isolation level of UR.
I did this because the blog has been around for a long time now Thursday, November 22, Happy Thanksgiving You should look to crig setting up poor data masking rules. Well, back in the day, Platinum was one of the most innovative marketers in the world of Db2, and they used to mail out a monthly tip about how mulkins use Db2 more efficiently. An Imperative for Compliance and Governance. A component of BCV5, known appropriately enough as The Masking Toolprovides a comprehensive set of data masking capabilities.
Have you worked on a cool application or figured out a nifty way of managing your databases?