IBM Rational ClearCase, Ant, and CruiseControl

IBM Rational ClearCase, Ant, and CruiseControl
Author :
Publisher : Adobe Press
Total Pages : 379
Release :
ISBN-10 : 9780321356994
ISBN-13 : 0321356993
Rating : 4/5 (94 Downloads)

Synopsis IBM Rational ClearCase, Ant, and CruiseControl by : Kevin A. Lee

"No previous build experience is necessary: Lee thoroughly explains everything from configuring SCM environments and defining build scripts through to release packaging and deployment. He offers solutions and techniques for both Base ClearCase and Unified Change Management (UCM)-IBM Rational's best practice Software Configuration Management usage model. Key techniques are presented in real-world context, through a full-fledged three-tier application case study. Book jacket."--Jacket.

Persistence in the Enterprise

Persistence in the Enterprise
Author :
Publisher : Addison-Wesley Professional
Total Pages : 467
Release :
ISBN-10 : 9780132704380
ISBN-13 : 0132704382
Rating : 4/5 (80 Downloads)

Synopsis Persistence in the Enterprise by : Roland Barcia

The Definitive Guide to Today’s Leading Persistence Technologies Persistence in the Enterprise is a unique, up-to-date, and objective guide to building the persistence layers of enterprise applications. Drawing on their extensive experience, five leading IBM® Web development experts carefully review the issues and tradeoffs associated with persistence in large-scale, business-critical applications. The authors offer a pragmatic, consistent comparison of each leading framework--both proprietary and open source. Writing for IT managers, architects, administrators, developers, and testers, the authors address a broad spectrum of issues, ranging from coding complexity and flexibility to scalability and licensing. In addition, they demonstrate each framework side by side, via a common example application. With their guidance, you’ll learn how to define your persistence requirements, choose the most appropriate solutions, and build systems that maximize both performance and value. Coverage includes Taking an end-to-end application architecture view of persistence Understanding business drivers, IT requirements, and implementation issues Driving your persistence architecture via functional, nonfunctional, and domain requirements Modeling persistence domains Mapping domain models to relational databases Building a yardstick for comparing persistence frameworks and APIs Selecting the right persistence technologies for your applications Comparing JDBCTM, Apache iBATIS, Hibernate Core, Apache OpenJPA, and pureQuery The companion web site includes sample code that implements the common example used throughout the technology evaluation chapters, 5-9. The IBM Press developerWorks® Series is a unique undertaking in which print books and the Web are mutually supportive. The publications in this series are complemented by resources on the developerWorks Web site on ibm.com. Icons throughout the book alert the reader to these valuable resources.

A Practical Guide to Trusted Computing

A Practical Guide to Trusted Computing
Author :
Publisher : Pearson Education
Total Pages : 415
Release :
ISBN-10 : 9780132704397
ISBN-13 : 0132704390
Rating : 4/5 (97 Downloads)

Synopsis A Practical Guide to Trusted Computing by : David Challener

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library

Dr. Dobb's Journal

Dr. Dobb's Journal
Author :
Publisher :
Total Pages : 512
Release :
ISBN-10 : UVA:X006182144
ISBN-13 :
Rating : 4/5 (44 Downloads)

Synopsis Dr. Dobb's Journal by :

Mining the Talk

Mining the Talk
Author :
Publisher : Pearson Education
Total Pages : 484
Release :
ISBN-10 : 9780132704359
ISBN-13 : 0132704358
Rating : 4/5 (59 Downloads)

Synopsis Mining the Talk by : Scott Spangler

Leverage Unstructured Data to Become More Competitive, Responsive, and Innovative In Mining the Talk, two leading-edge IBM researchers introduce a revolutionary new approach to unlocking the business value hidden in virtually any form of unstructured data–from word processing documents to websites, emails to instant messages. The authors review the business drivers that have made unstructured data so important–and explain why conventional methods for working with it are inadequate. Then, writing for business professionals–not just data mining specialists–they walk step-by-step through exploring your unstructured data, understanding it, and analyzing it effectively. Next, you’ll put IBM’s techniques to work in five key areas: learning from your customer interactions; hearing the voices of customers when they’re not talking to you; discovering the “collective consciousness” of your own organization; enhancing innovation; and spotting emerging trends. Whatever your organization, Mining the Talk offers you breakthrough opportunities to become more responsive, agile, and competitive. Identify your key information sources and what can be learned about them Discover the underlying structure inherent in your unstructured information Create flexible models that capture both domain knowledge and business objectives Create visual taxonomies: “pictures” of your data and its key interrelationships Combine structured and unstructured information to reveal hidden trends, patterns, and relationships Gain insights from “informal talk” by customers and employees Systematically leverage knowledge from technical literature, patents, and the Web Establish a sustainable process for creating continuing business value from unstructured data Preface xv Acknowledgements xx Chapter 1: Introduction 1 Chapter 2: Mining Customer Interactions 21 Chapter 3: Mining the Voice of the Customer 71 Chapter 4: Mining the Voice of the Employee 93 Chapter 5: Mining to Improve Innovation 111 Chapter 6: Mining to See the Future 133 Chapter 7: Future Applications 163 Appendix: The IBM Unstructured Information Modeler Users Manual 171

Software Configuration Management

Software Configuration Management
Author :
Publisher :
Total Pages : 392
Release :
ISBN-10 : OCLC:1100829073
ISBN-13 :
Rating : 4/5 (73 Downloads)

Synopsis Software Configuration Management by : IBM Redbooks

This IBM Redbook describes configuration management in general and how it is implemented in the Rational products ClearCase and ClearQuest. The target audience for this redbook is anyone considering a software configuration management (SCM) solution, and in particular, project managers and configuration management leaders responsible for medium and large UCM deployments. In Part 1 we introduce the general concept of software configuration management (SCM), and why software asset and lifecycle management is good business. We describe an SCM strategy that leads to the ClearCase and ClearQuest products. In Part 2 we provide the details for planning and implementing SCM using a ClearCase environment, focusing on the test environment, network, servers, and clients. In Part 3 we introduce ClearQuest, its terminology, the roles and responsibilities of the different types of users, and the infrastructure required for a UCM environment. We also provide the details for planning and implementing ClearQuest. In Part 4 we introduce unified change management (UCM) using ClearCase UCM and ClearQuest, including design considerations for an effective UCM implementation, and how UCM is used to manage complexity by raising the level of abstraction. In Part 5 we describe how to do parallel development in multiple geographical locations using ClearCase and ClearQuest MultiSite, including detailed procedures for planning and implementing MultiSite for a UCM environment.

Mainframe Basics for Security Professionals

Mainframe Basics for Security Professionals
Author :
Publisher : Pearson Education
Total Pages : 194
Release :
ISBN-10 : 9780132704342
ISBN-13 : 013270434X
Rating : 4/5 (42 Downloads)

Synopsis Mainframe Basics for Security Professionals by : Ori Pomerantz

Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why

IBM Rational Unified Process Reference and Certification Guide

IBM Rational Unified Process Reference and Certification Guide
Author :
Publisher : Pearson Education
Total Pages : 415
Release :
ISBN-10 : 9780132704298
ISBN-13 : 0132704293
Rating : 4/5 (98 Downloads)

Synopsis IBM Rational Unified Process Reference and Certification Guide by : Ahmad K. Shuja

The Only Official RUP® Certification Prep Guide and Compact RUP Reference The IBM® Rational Unified Process® has become the de facto industry-standard process for large-scale enterprise software development. The IBM Certified Solution Designer - IBM Rational Unified Process V7.0 certification provides a powerful way for solutions developers to demonstrate their proficiency with RUP. The first and only official RUP certification guide, this book fully reflects the latest versions of the Rational Unified Process and of the IBM RUP exam. Authored by two leading RUP implementers, it draws on extensive contributions and careful reviews by the IBM RUP process leader and RUP certification manager. This book covers every facet of RUP usage. It has been carefully organized to help you prepare for your exam quickly and efficiently--and to provide a handy, compact reference you can rely on for years to come. Coverage includes A full section on RUP exam preparation and a 52-question practice exam Core RUP concepts, the new RUP process architecture, and key principles of business-driven development RUP’s architecture-centric approach to iterative development: practical issues and scenarios Patterns for successful RUP project implementation–and “anti-patterns” to avoid The Unified Method Architecture (UMA): basic content and process elements RUP content disciplines, in depth: Business Modeling, Requirements, Analysis and Design, Implementation, Test, Deployment, Project Management, Change and Configuration Management, and Environment Essential RUP work products, roles, and tasks RUP phases, activities, and milestones RUP tailoring and tools for your organization--including introductions to IBM Rational Method Composer (RMC) and MyRUP

Reaching The Goal

Reaching The Goal
Author :
Publisher : Pearson Education
Total Pages : 532
Release :
ISBN-10 : 9780132797429
ISBN-13 : 0132797429
Rating : 4/5 (29 Downloads)

Synopsis Reaching The Goal by : John Arthur Ricketts

“There is no doubt that this is a truly original and groundbreaking work in applying the Theory of Constraints. I run a services company and learned some things about the services business. Anyone involved in large services companies needs to look at what John is proposing. I will definitely quote this material frequently.” Chad Smith, Managing Partner, Constraints Management Group “The information presented in this book is badly needed by service providers who struggle to balance supply and demand with their resources.” Carol A. Ptak, CFPIM, CIRM “The techniques that John brings to light in this book are the bridge from the vision of Dr. Goldratt’s work to the successful implementation in a range of services firms.” From the Foreword by Erik Bush, Vice President, IBM Global Services Discover the powerful Theory of Constraints (TOC), and use it to drive continuous performance improvement in any services organization Identify the hidden constraints that are limiting your organization, and manage or eliminate them Use TOC to improve the way you manage resources, projects, processes, finance, marketing, and sales Determine whether your organization faces an internal or external constraint, manage that constraint accordingly, and anticipate where the next constraint will arise Release latent capacity shrouded by common business practices Simplify processes that have grown unmanageably complex Optimize your enterprise as a whole rather than suboptimizing individual business units Get buy-in to fundamental changes in strategy, tactics, and operations Managing services is extremely challenging, and traditional “industrial” management techniques are no longer adequate. In Reaching the Goal, Dr. John Arthur Ricketts presents a breakthrough management approach that embraces what makes services different: their diversity, complexity, and unique distribution methods. Ricketts draws on Eli Goldratt’s Theory of Constraints (TOC), one of this generation’s most successful management methodologies...thoroughly adapting it to the needs of today’s professional, scientific, and technical services businesses. He reveals how to identify the surprising constraints that limit your organization’s performance, execute more effectively within those constraints, and then loosen or even eliminate them. This book’s relentlessly practical techniques reflect several years of advanced IBM research and consulting with enterprise clients. Step-by-step, Ricketts shows how to apply them throughout your most crucial business functions...from project management to finance, process improvement to sales and marketing. Whatever your role in improving service delivery, processes, or profitability, this book gives you the tools to reach your goals...and go beyond them Identify, manage, and overcome your key constraints Five steps to uncovering and addressing the real obstacles to improved performance Optimize core business functions, one step at a time Improve the way you manage resources, projects, processes, finance, and marketing Implement TOC rapidly and effectively Get buy-in, deploy infrastructure, and provide the right IT support?

Implementing the IBM Rational Unified Process and Solutions

Implementing the IBM Rational Unified Process and Solutions
Author :
Publisher : Pearson Education
Total Pages : 371
Release :
ISBN-10 : 9780132704328
ISBN-13 : 0132704323
Rating : 4/5 (28 Downloads)

Synopsis Implementing the IBM Rational Unified Process and Solutions by : Joshua Barnes

The Authoritative, Best-Practice Guide to Improving Development Processes with IBM® Rational Unified Process® (RUP®) This book delivers all the knowledge and insight you need to succeed with the IBM Rational Unified Process and Solutions. Joshua Barnes presents a start-to-finish, best-practice roadmap to the complete implementation cycle of IBM RUP–from projecting ROI and making the business case through piloting, implementation, mentoring, and beyond. Drawing on his extensive experience leading large-scale IBM RUP implementations and working with some of the industry’s most recognized thought leaders in the Software Engineering Process world, Barnes brings together comprehensive “lessons learned” from both successful and failed projects. You’ll learn from real-world case studies, including actual project artifacts. Whether you’re an executive, software professional, or consultant, this book will help you continuously improve the maturity of your development processes–and reap the benefits: better quality, faster delivery, and more business value. After reading this book you will be able to · Get past the myths of software process improvement to focus on what’s truly practical · Identify and evaluate your best candidate process solutions · Objectively project the ROI achievable with IBM R UP and IBM Rational solutions · Develop funding models, business cases, and executive support · Recruit, staff, organize, and motivate your implementation team · Plan for effective integration, process alignment, and change management · Choose the right pilots, learn the right lessons, and develop effective adoption models · Move quickly to successful program-level implementation · Set maturity level goals for process and tool utilization · Map “End States” for both quantity and quality · Plan for training and mentoring–and understand the distinct role of each · Keep the momentum going after your implementation is complete Link to www.upmentors.com, where you can download actual sample implementation documents–not just templates! www.ibmpressbooks.com Preface xvii Acknowledgments xxiii About the Author xxv Chapter 1: Evaluating Process Solutions 1 Chapter 2: Your First Steps Toward Implementing RUP and IBM Rational Solutions 17 Chapter 3: Assessing Your Organization and Building Your Business Case for Organizational Change 29 Chapter 4: Implementation Team 49 Chapter 5: Setting Up Pre-Integrated and Process-Aligned Tooling 67 Chapter 6: Implementation Approach 75 Chapter 7: Transitioning to a Program Approach 99 Chapter 8: Funding Model 117 Chapter 9: Training and Mentoring Models 131 Chapter 10: Is Your Implementation Complete? 149 Appendix 1: Executive ROI Overview 155 Appendix 2: Detailed Appendix for Executive ROI Overview 159 Appendix 3: Maturity Level Goals–Sample Tasks 167 Index 175