Posted by Craig S. Mullins at AM No comments: . The tool offers dozens of masking algorithms implemented as Db2 user-defined functions (UDFs). Craig Mullins. You may know Craig from his popular books: Db2 Developer’s Guide, 6th edition and Database Administration: The Complete Guide to DBA. Craig S Mullins is president & principal consultant of Mullins Consulting, Inc., is an IBM Information Champion, and an IBM Gold Consultant for DB2. Craig has.
|Published (Last):||24 May 2005|
|PDF File Size:||9.63 Mb|
|ePub File Size:||5.2 Mb|
|Price:||Free* [*Free Regsitration Required]|
IBM Systems Magazine – Learning to Code Efficient Db2 SQL
If the criag is read only, a dirty read is fine because there are no changes being made to the data. Other types of data, like names or addresses, are picked from a set of lookup tables. With all that history aside, I am just looking forward to celebrating with family and eating a nice, juicy turkey! But often this is done muullins a thorough investigation of the possible implications. Masking while copying data is generally most useful when copying data from a production environment into a test or QA system.
If you want the ebook, it can be ordered from the same link below. A dirty read can cause duplicate rows to be returned where none exist. If you are interested, I wrote a part series of blog post on Db2 locking back in Database Trends and ApplicationsApril 12, Hope you all out there in Db2-land find the book useful. Planet MainframeApril 6, Do you want to share your experiences, know-how, and best practices mullibs other Db2ers?
Craig S. Mullins – DB2 Developer’s Guide
NuoDB Blog, February vb2, It seems that businesses these days have abdicated any responsibility for ethically managing sb2 collection and usage of data. If a unique constraint is defined on the data different input values will result in different hashed values… and likewise, repeated input values will result in the same hashed output values mullinx other words, duplicates.
For example, if the primary key is X, any foreign key referring to that PK would also contain the value X… and X always hashes to the same number, so the generated value would be the same for the PK and all FKs.
At a high level, both scalability and elasticity help to improve availability and performance when demand is changing, but what exactly are these two things? Database Trends and ApplicationsJanuary 2, What type of data should be masked?
If the application program is using the UR isolation level, it will read data without taking locks. To summarize, a transaction—when executed alone, on a consistent database—will either complete, producing correct results, or terminate, with no effect. Database Trends and ApplicationsOctober mullind, DevOps and the Database.
Craig S Mullins
Application programmers must understand how concurrency problems impact the access and modification of Db2 data. So let me explain. Sometimes newer tech can confuse and co- opt earlier craib. This article outlines the many challenges of managing modern age IT. Happy HolidaysHappy New Year. Masked data does not expose sensitive data to those using it for tasks like software testing and user training.
Second of a four part series on SQL performance; Part 2 focuses on query analysis and the ways that SQL gets turned into executable code. This article outlines some of the techniques that can be used to optimize mulilns application performance. No one can match Craig S. Articles Published in