Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
SOA and decentralized IT systems
One of the key points of this chapter is that SOA, like business rules, is about raising the abstraction levels of interfaces: interfaces that must support the business, not the system. Continue Reading
SOA and business rules management
Author Ian Graham looks at the technology of business rules management systems (BRMS): its features, responsibilities, benefits and business drivers for adoption. Continue Reading
DB2 security: The starting point
A DB2 security plan is essential to protecting information. The fundamental steps to conceiving a DB2 security plan are outlined in this chapter excerpt -- beginning with recognizing major security risks. Continue Reading
-
Why data governance projects fail
Expert Rick Sherman discloses the top reasons why 90% of data governance projects are doomed for failure. Read his advice to make sure that your projects are not! Continue Reading
Data and the enterprise architecture framework
Using a detailed data model, Hay discusses data and the enterprise architecture framework with a focus on the business owner, architect, designer and the functioning system. He also examines business terms, concepts and fact types in relation to his... Continue Reading
How to define business requirements for data warehousing projects
Using the Business Requirements Definition, the authors define the process of gathering business requirements, which begins with interviewing IT and business professionals, in order to organize and analyze data into a DE/BI system strategy to make ...Continue Reading
IBM iSeries (AS/400) DB2 UDB: Top 10 expert questions
IBM iSeries/i5 DB2 invokes alot of questions. Here, find the top ten iSeries questions that have been answered by our IBM iSeries/i5 DB2 UDB expert, Kent Milligan.Continue Reading
EDA software: Event-driven architecture and DB2
Oracle is now coming out with an event-driven architecture based on the EDA's ability to communicate between software and support business rules. How could DB2 help users to achieve the full benefits of an EDA?Continue Reading
Customer data integration: Reaching a single version of the truth
In this excerpt from Chapter 6, "Who Owns the Data Anyway? Data Governance, Data Management, and Data Stewardship," authors Jill Dyché and Evan Levy discuss the rampant corporate conversation of data ownership, and the oft-cited but ...Continue Reading
Data model patterns: A metadata map
Read this excerpt from Data Model Patterns: A Metadata Map for a guide to all things metadata. That is, data about data.Continue Reading
-
XQuery and XML data: DB2 helps manage the era of unstructured data
The arrival of IBM XQuery and XML data is simplifying users' decisions in this era of unstructured data, just as the arrival of the relational database and SQL simplified IT buyers' decisions twenty years ago.Continue Reading
Information security: A strategic approach
Read this excerpt from Information Security: A Strategic Approach for insight and information on information security strategy best practices.Continue Reading
'Low IT' databases: DB2 for the low IT user
Wayne Kernochan examines the 'Low-IT' database needs of what he terms 'Low-IT' users, as well as how IBM's DB2 Express is proving itself to be a highly useful alternative in the Low-IT market.Continue Reading
Rogue data management
Every company or organization has some of its key data assets managed outside of its business systems. While most companies are permeated with "rogue data", this type data is often difficult to find, and even harder to manage.Continue Reading
Critical infrastructure protection in homeland security: Defending a networked nation
In this excerpt about critical infrastructure protection, author Ted G. Lewis posses a key security question: What should be protected and how?Continue Reading