Académique Documents
Professionnel Documents
Culture Documents
Craig S. Mullins
craig.mullins@softwareonz.com craig@CraigSMullins.com
Significant reduction in CPU cycles by eliminating costly ETL processes Identify certain business events as soon as they occur
(i.e. claim submitted over $1M)
High availability with active/active replication between data centers Optimize existing ETL processes by supplying only the data that has changed Real-time integration with newer applications
(i.e. send a text message if account balance goes negative)
No need to modify existing applications to track data changes or publish specific business events Extend the life of your legacy DB2 applications by integrating data changes with newer applications Allows for auditing by tracking all data changes to important tables
SELECT C.color FROM Colors AS C WHERE C.color NOT IN (SELECT P.color FROM Products AS P);
Data Quality
Poor data quality costs the typical company at least ten percent (10%) of revenue; twenty percent (20%) is probably a better estimate.
2. 3.
4. 5. 6.
Data Masking and Obfuscation Database and Data Access Auditing DBA Procedures (e.g. change management)
Unauthorized change is one of the best (and worst) ways to get your auditors attention.
7. 8. 9. 10.
Data Movement Tracking Master Data Management Data Definition and Categorization Metadata Management
1. 2. 3. 4. 5. 6. 7. 8. 9.
Jan. 20, 2009 Heartland Payment Systems ~130 million Oct. 2, 2009 U.S. Military Veterans 76 million Jan. 17, 2007 TJ stores (TJX) 45.7 million June 16, 2005 CardSystems over 40 million Dec. 15, 2009 RockYou 32 million (SQL injection) May 22, 2006 U.S. Dept. of Veteran's Affairs 28.6 million Mar. 8, 2006 iBill 17,781,462 Mar. 26, 2008 Bank of New York Mellon 12.5 million July 3, 2007 Fidelity National Information Services (Certegy Check Services Inc.) 8.5 million 10. Sept. 14, 2007 TD Ameritrade Holding Corp. 6.3 million
As of Feb 17, 2010, total records breached: 345,724,373 (since January 2005)
Top Ten Non-Technical Security Steps 1. 2. 3. 4. 5. 6. 7. 8. Buy and use a good shredder Dont wear your ID badge outside of the office Be vigilant when using your laptop in public Buy and use a screen shade Dont put identification on your laptop (e.g. ID tags) Company should invest in an anonymous PO box Be careful about company logo clothing Dont leave unencrypted disks/USB sticks/etc. laying around 9. Invest in a laptop lock and use it whenever possible 10. Never put any disk you do not know into your computer (salaries)
Top Ten Under-Utilized Features 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Table Expressions CASE statements REOPT (other than NONE) Triggers Auto expand buffer pools Real Time Stats User-Defined Functions DISTINCT Types LOBs Date/Time Arithmetic
XML?
Top Ten Specialty Processor Workloads 1. 2. 3. 4. 5. 6. IFL: Linux stuff zIIP: distributed SQL requests zIIP: parallel SQL requests zIIP: data warehousing/star schema zIIP: native SQL stored procedures run via DDF (V9) zIIP: index maintenance during LOAD, REORG, and REBUILD 7. zAAP: Java 8. zAAP: XML 9. (zAAP on) zIIP: Java and XML 10. zIIP: non-DB2 stuff including:
z/OS Communcation Server encryption, z/OS XML System Services, and System Data Mover processing associated with zGM/XRC (z/OS Global Mirror)
Top Ten DB2 Myths 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Use Views to Insulate Programs from Change Locking Problems Indicate a Database Problem Primary Key is Usually a Good Choice for Clustering Just Using the Defaults Should Work Out Well Programmers Dont Need to Know How to Tune SQL Black Boxes Work Well for Performance Using NULLs Can Save Space RUNSTATS Arent That Important DB2 is a Hog It Depends!
Top Ten Outdated Standards 1. 2. 3. 4. Limiting indexes per table to 3 or 5 or Requring base table views Forbidding dynamic SQL Limiting number of tables per join (typically for online txns) 5. Avoiding NULLs 6. Arcane table naming standards (e.g. TXR0031) 7. Just about any buffer pool standard (e.g. BP0 only) 8. Almost any standard using the words always or never 9. Fear of REBINDing 10. Putting standards in a binder instead of online
Top Ten Things to Do Before You Visit the DBA 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Try to Figure It Out Yourself, Please RTFM Figure out what you are going to say to him/her Be sure it is the truth! Dont assume you (or your code) are innocent Have a drink (coffee?) Bring the DBA a drink (your choice!) Never say But IBM said it should work this way. Never say But it worked that way yesterday. Always say Thank you.
Ten Eleven Rules of the Road for DBAs 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Write Down Everything Keep Everything Automate Share Your Knowledge Focus Your Efforts Dont Panic! Measure Twice, Cut Once Understand the Business Dont Be a Hermit Use All of the Resources at Your Disposal Keep Up-to-Date
From zJournal article available at: http://www.craigsmullins.com/zjdp_042.htm
Top Ten Weasel-Speak Interpretations (Part 1) 1. 2. 3. 4. 5. We will look into it (We will forget all about it the moment you leave) It is in process (The bureaucracy involved has rendered it hopeless) I didnt get your e-mail (I was too busy updating my Facebook status to read your e-mail) The entire project is being abandoned [or reorganized] (The only guy who understood it just left or retired) A number of different approaches are being tried (We are all just guessing at this point)
Top Ten Weasel-Speak Interpretations (Part 2) 6. Preliminary tests were inconclusive (We cant get the dang thing to run) 7. Test results are very promising (Amazing, it actually works) 8. What do you think about this (I only want your opinion so you can share the blame later) 9. Robust (We want you to buy this thing but have no Earthly idea how to convince you, so we call it robust)* 10. Low maintenance (Almost impossible to fix)
* See also, Best of Breed
http://www.redbooks.ibm.com/
z/OS LUW
Top Ten DB2 9 for z/OS Application Developer Features 1. 2. 3. 4. 5. 6. Plan Management: Package Stability MERGE SELECT FROM UPDATE, DELETE, & MERGE Index on Expressions Native SQL Procedure Language FETCH FIRST and ORDER BY in subselect and fullselect 7. INTERSECT and EXCEPT 8. INSTEAD OF TRIGGER 9. TRUNCATE 10. LOB Improvements
Reordered Row Format Index Compression CLONE Tables BUILD2 Phase Eliminated in Online REORG APPEND YES
ignoring clustering during INSERT and LOAD
The promise of REOPT(AUTO) IMPLICITLY HIDDEN columns New Data Types: BIGINT, DECFLOAT, BINARY/VARBINARY 10. Database Definition on Demand
- renaming a tables column; renaming an index
Top Ten Trends 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Industry Consolidation Cloud Computing SaaS Virtualization Server Consolidation Open Source Social Media Complexity Autonomic, Self-Managing Databases Commoditization
Top Ten Books for DB2 Professionals 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide DB2 Developers Guide
Craig S. Mullins
craig@craigsmullins.com http://www.CraigSMullins.com craig.mullins@softwareonz.com http://www.softwareonz.com