Posted by Craig S. Mullins at AM No comments: . The tool offers dozens of masking algorithms implemented as Db2 user-defined functions (UDFs). Craig Mullins. You may know Craig from his popular books: Db2 Developer’s Guide, 6th edition and Database Administration: The Complete Guide to DBA. Craig S Mullins is president & principal consultant of Mullins Consulting, Inc., is an IBM Information Champion, and an IBM Gold Consultant for DB2. Craig has.
|Published (Last):||24 November 2004|
|PDF File Size:||2.66 Mb|
|ePub File Size:||1.80 Mb|
|Price:||Free* [*Free Regsitration Required]|
Click here for articles and blogs where Craig is quoted. But as of the 19th Century, the final Thursday in November has been the customary celebration date.
IDUG : Craig S Mullins
And how do scalability and elasticity help to improve availability and performance? Database Trends and ApplicationsJune 1, He is also a regular contributor to several online data- and database- related portals and blogs.
TDANJanuary 3, The results of running a transaction will record the effects of a business process—a complete business process.
BCV5 and Data Masking. SQL Performance, Part 1: TDANApril 18, The following two queries can be used to find the applications using uncommitted reads.
Mulllins only do you need to understand DB2, but you also need to understand programming and design issues, SQL, data modeling, operating system internals, on -line transaction processing systems, ddb2 monitors, third-party tools, distributed data, and office politics.
Now anybody who has ever worked on creating a test bed of mul,ins for their Db2 environment knows how much work that can be.
Craig S Mullins
What are the Database Scalability Methods? Application programmers must understand how concurrency problems impact the access and modification of Db2 data. Other types of data, like names or addresses, are picked from a set of lookup tables. Generally speaking, I think blogs are mostly for ….
In a mailbox and delivered by a postal worker. At vb2 time, these rules are evaluated and the Masking Tool automatically identifies the involved data types and performs the required masking. So the hashing algorithm takes the input value and hashes it to a specific number that serves as a seed for a generator.
The latest edition of a classic book on DB2 d2 database administrators and application programmers. If a unique constraint is defined on the data different input values will result in different hashed values… and likewise, repeated input values will result in the same hashed output values in other words, duplicates.
But back to today’s topic Just a quick post today to wish all of my readers in the US and everywhere, really a very Happy Thanksgiving. Mainframes are not often mentioned in big data articles and advertising, but they should be.
Direction ITApril 19, I did this because the blog has been around for a long time now What makes this book unique is the case studies illustrating various DB2 10 features and capabilities. The input can be any string or a number. Database Trends and ApplicationsMay 8, Monday, November 12, Data Masking: Happy Thanksgiving Just a quick post today to wish all of my readers in the US and everywhere, really a very Happy Thanksgiving.
Craig Mullins, Author at IBM IT Infrastructure Blog
It is hard to believe that yet another year has come and gone well, almost and that the ceaig season is once again upon us. Database Trends and ApplicationsDecember 4, Multiple Table Access Methods.
Data masking is an important ddb2 of building any test bed of data — especially when data is copied from production. Wild carding of the rules is allowed, so you can apply a rule to all tables that match a pattern.
Craig has three decades of experience in all facets of database systems development including developing and teaching DB2 and SQL classes, systems analysis and design, database and system administration, and data analysis and modeling.