Craig Mullins. You may know Craig from his popular books: Db2 Developer’s Guide, 6th edition and Database Administration: The Complete Guide to DBA. Craig S Mullins is president & principal consultant of Mullins Consulting, Inc., is an IBM Information Champion, and an IBM Gold Consultant for DB2. Craig has. DB2 Developer’s Guide [Craig S. Mullins] on *FREE* shipping on qualifying offers. DB2 Developer’s Guide, Fourth Edition is completely revised.

Author: Douzshura Meztikree
Country: Slovenia
Language: English (Spanish)
Genre: Business
Published (Last): 6 February 2015
Pages: 127
PDF File Size: 16.51 Mb
ePub File Size: 15.74 Mb
ISBN: 543-6-84228-689-7
Downloads: 32079
Price: Free* [*Free Regsitration Required]
Uploader: Tasho

That means no matter how many times you run the masking process you get the same mask values; the values are different than the production values, but they always match the same test values. To be in compliance, all PII must be masked or changed, and if it is changed, it should look plausible and work the same as the data it is masking. ACID is an acronym for atomicity, consistency, isolation, and durability. Well, back in the day, Craaig was one of the most innovative marketers in the world of Db2, and they used to mail out a monthly tip about how to use Db2 more efficiently.

If you use DB2 in your workplace, the most recent edition of “DB2 Developer’s Guide” should definitely be on your bookshelf.

Similar input values result in totally different generated values so the results are not predictable and the hashing function is designed to be non-invertible, so you cannot infer information about the original value from the generated value.

When the bank receives the request, it performs the following tasks, which mjllins up the complete business process.

Craig Mullins

Terms of Service Privacy Policy Contact. Mullins As a professional Muloins developer your days are extremely busy. The dirty read capability can provide relief to concurrency problems and deliver faster performance in specific situations. First of all, there used to be a software company called Platinum Technology….


Data masking is applied using a set of rules that indicate which columns of which tables should be masked.

Masked data does not expose sensitive data to those using it for tasks like software testing and user training. Regular readers should have noticed that the logo and basic design of the blog has been “spiffed” up a bit. If the UR isolation level was specified for the second transaction, it would read the changed data even though it had yet to be committed.

But back to today’s topic Mullins has done a good job d2b transforming highly technical information into easily understandable text. Take a look at the data masking capabilities of BCV5 and decide for yourself what you need to protect your valuable data and comply with the industry and governmental regulations on that data.

Masked data does not expose sensitive data to those using it for tasks like software testing and user training. Wouldn’t it be nice if there were a place to turn for advice? And importantly, it is also time to wind down mullinns relax with friends, family and loved ones.

Alternately, a dirty read can cause no rows to be returned when one or more actually exists. All of the generated data is plausible, but not the real data.

What makes this book unique is the case studies illustrating various DB2 10 features and capabilities.

You should look to avoid setting up poor data masking rules. Data masking protects the actual data but provides a functional substitute for tasks that do not require actual data values. Masking while copying data is generally most useful when copying data from a production environment into a test craiy QA system.


You request the money either in person by handing a slip to a bank teller dh2 by using an ATM Automated Teller Machine. And yes, I said mailed. Application programmers must understand how concurrency problems impact the access and modification of Db2 data. Our m mullisn idea of Thanksgiving was first officially called for in all states in by a presidential proclamation made by Abraham Lincoln.

Have you ever wanted to put together a presentation and de…. Whether you are a DB2 expert or just want to broaden your knowledge, a systems programmer or a programmer, xb2 book contains an enormous amount of data which is beautifully presented.

Another bad approach is shifting the data, for example A — B, B — C, etc. At run time, these rules are evaluated and the Masking Tool automatically identifies the involved data types and performs the required masking. The book guides you through the major components and DB2 internals from a practitioner’s perspective.

Craig S. Mullins – DB2 Developer’s Guide

I just got my author’s copies as you can see in this video: The functions are repeatable — the same source value always yields the same masked target value. Monday, November 12, Data Masking: The data in the database must be correct and ,ullins after the transaction executes. So, when is it a good idea to implement dirty reads using the UR isolation level? For those who do not know, data masking is a process that creates structurally similar data that is not the same as the values used in production.

Mullins, All Criag Reserved.