Book Review – MySQL Workbench: Data modelling & Development by Michael McLaughlin

Tags

, , , ,

MySQL Workbench Data Modeling and Development

MySQL Workbench Data Modeling and Development

Having reviewed several books recently, and currently working on another book – I was offered the chance to look at MySQL Workbench: Data Modelling & Development by Michael McLaughlin which I took up as I was interested to know more about the Workbench tool (despite having worked with MySQL on and off for about 10 years, I’ve only really used command line and SQL editors or Eclipse plugins when working with MySQL).

From a pure readability perspective, this is undoubtedly technically well written. My difficulty with the book comes from the style, and presumed level of intelligence of the reader.  The difficulty comes from several perspectives’ firstly the author can feel a little condescending, to illustrate my point on page 180 the book says ‘Select Schemata step (that’s a fancier word for the fancy word schema) ‘.  Do you really need such a statement? Further the book spends the best part of the first 100 pages on walking through UI based installers for Windows 7, Linux (Debian and Fedora), and Mac OS X.  Although the look and feel of these installers will differ slightly, aside from some of the environmental considerations (configuring your hosts file for example) the installation process is consistent enough (and obvious enough given it is UI wizards) to only need to explain the end to end process for one platform, and then just address the differences for the other platforms, not repeat the entire process.  The only blessing in these first couple of chapters the author has thought to highlight a few common install issues and their resolutions (addressing my classic complaint people only think about the happy path). During the installation, the book makes reference to the use of DNS, but I don’t believe the use of DNS in a production environment is particularly well explained.

Having waded through to chapter 3 we can get started with the modelling aspect of the workbench. The chapter sets out first to explain some modelling concepts – starting with Object Orientation (OO) but doesn’t do a great job of it, starting out making reference to a number principles but then talking about the ‘principle of the one’, given my experience I did understand what the author was trying to express but, for someone experienced it could have been more simply expressed.  after OO, Normalisation is explained, and what defines the different levels of normalisation, but not the mechanics that can be followed to go from the levels of normalisation (something I was taught over 20 years ago).  Given that book talks about modelling,  I had expected the book to at-least touched upon other modelling approaches used for delivering the needs of data warehousing (star schemas etc), but his didn’t even obtain an aside.  Having spent nearly 100 image heavy pages on installation, all of these concepts are introduced in a single very text heavy chapter, which feels like we’ve swung too far the other way.

As the book goes on into development aspects it errs away from addressing SQL at all, and focuses entirely on designing with INNODB table behaviours.  Admittedly INNODB is the common engine (and the default assumed behaviour when thinking about database tables) but isn’t the only table type.  All of which is a shame as if you want to get the most out of MySQL the other table types have their value and benefits.

So, what value does the book bring.  Well for a student learning about databases for the 1st time (hard visualize when you think how pervasive the technology is today – even smart phones carry DBs now) this book along with a good guide on SQL and you’d be well on your way to getting some practical experience with MySQL.  to be honest the book would have setup far better expectations if it had been called MySQL Workbench for Dummies.  For the seasoned engineer who has worked with MySQL, understands database design then you might want to think twice about getting this book; that said I did pickup a few useful titbits – but getting them was hardwork.

Useful Links for the book:

Java EE 7 Development with Netbeans videos

Tags

, , , ,

Java EE Development with NetBeans 7 [Video]

Java EE Development with NetBeans 7 [Video]

Earlier this year I reviewed some videos by David Heffelfinger on Java EE Development with Netbeans 7 .  I’m pleased to say that the videos have now become publicly available on the Packt site – http://www.packtpub.com/java-ee-development-with-netbeans-7/video  The videos come in neat bite sized chunks that allow you review how to do a particular task, with the videos back to back providing a solid joined up view of a range of activities using a common set of examples.  I’d recommend checking them out if you want to know more about either Netbeans or common web development approaches with Java 7.

 

David also has a book out on the subject of Java EE 6 with Netbeans as well http://www.packtpub.com/java-ee-6-development-with-netbeans-7/book   and his author page at packt – http://www.packtpub.com/authors/profiles/david-heffelfinger

 

Enterprise Security – A Data Centric Approach

Tags

, ,

Enterprise Data SecurityAs I work my way through the Aaron Woody book Enterprise Security: A Data Centric Approach to Securing the Enterprise I’ve been building a mind map of helpful notes -to help serve as a reminder or means to quickly drill back into the book for future reference.

The mind map has been build using freemind – it isn’t the prettiest of documents, but content is king here.

Freemind Mindmap as an image https://www.dropbox.com/s/u1ggk7exi6t0t3o/Enterprise%20Data%20Security.png  as a Freemind file https://www.dropbox.com/s/lf53fs63c4x1v91/Enterprise%20Data%20Security.mm freem,ind can be obtained from freemind.sourceforge.net/

Enterprise Security: A Data-Centric Approach to Securing the Enterprise – book review chapter 2

Tags

, , ,

Enterprise Security - A Data Centric Approach to Securing the Enterprise

Enterprise Security – A Data Centric Approach to Securing the Enterprise

Continuing with the review of Enterprise Security: A Data Centric Approach to Securing the Enterprise by Aaron Woody having given a bit of history and motivation for an alternate approach Chapter 2 of the book starts describing the data centric approach.

We start out looking at why network boundaries need to revisited – as a result of BYOD, closer integration with business partners, collapsed/simplified software stacks etc.  Then go into defining in more details the data centric views and how t go about building a trust model for identifying what needs to be secured. A trust model looks at the different dimensions that can impact data:

  • Data (what actually are we protecting – is the data your commercial crown jewels such as a customer list, classifying the data to understand its characteristics, where is it located and so on)
  • Processes – what can be done to data
  • Applications – systems interacting with data
  • Users – differentiated from roles – their relationship to the data employees, contractors, third parties etc
  • Roles – the roles people have to perform, system admins, data stewards etc
  • Risk – as you can never guarantee everything, what are the consequences of a breach
  • Policy & Standards – legal requirements e.g. HIPAA, PCI DSS, DPA plus internal corporate policies

With the guidance to help gather the information you can start to build a profile of your data and the need (or not) for security with challenges and risks that need be addressed to achieve this within an organisation.  All of which has to take into account of ‘data at rest’ (i.e. in databases, flat files etc) and ‘in motion’ transfers such as email, HTTP, FTP, SQLNet and so on.

The book then begins to talk about architectures that can reflect the considerations and needs of your data.

In terms of the writing, chapter is pretty direct and to the point which is great as long as you have some basic appreciation of security needs.  It would have been good to enrich the information with some examples (although the Appendix does illustrate a bit further). The ideal would have been to have a use case running through the book (perhaps at the end of each chapter applying some of the ideas to a fictitious scenario).

Useful Links

Enterprise Security: A Data-Centric Approach to Securing the Enterprise – book review

Tags

, , , , ,

I have started to review another book, this time Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody. Based on the interest that my review of Getting Started with Oracle Event Processing 11g I thought I’d follow a similar approach of reviewing one or two chapters at a time, although because of other constraints possibly not as quickly as last time.

As an enterprise architect, and having worked within some more sensitive environments which means security typically has a lock the world down, particularly at the perimeter. But with an increasingly less practical as we become ever more connected. Not to mention the tighter the old approaches are applied, the more the business will by pass IT (e.g. Go acquire SaaS solutions without IT support), the net result being a home goal in undermining the very thing you’re trying to achieve. So the killer question is, can the book show another way that works matching the challenges ranging from SaaS (software as a service) to BYOD (bring your own device – i.e. connecting your own smart phone to systems and work with them on the move etc) against the backdrop of increasing data legislation and commercial fallout (customer loss etc) as a result of security breaches becoming public knowledge.

Chapter 1 is very much a good scene setter, providing some of the background as to how security approaches have evolved over the last 30 or so years. It sets out some clear perspectives on the challenges of applying security such as

  • making cases for investment
  • Applying security as an overlay on a solution rather than being an integral part of a design and the impacts this can cause
  • The challenges of stakeholders involved
  • The mentality of just locking the perimeter (when statistics regularly show that increasing data leakages are a result of accident or malicious actions by those inside the organisation

The book also challenges the mentality of security is the network, which a grave mistake as security impacts processes and roles just as much as it does the software and physical infrastructures.

This sets up for the journey for defining an alternate approach starting with defining the boundaries that should be considered.

Amusing paper article from Oz

Tags

,

PERTH – An SAS trooper collecting toys for children was stabbed when he helped stop a suspected shoplifter in east Perth . The ‘Toys-R-Us’ Store Manager told ‘The West Australian’ that a man was seen on surveillance cameras last Friday putting a laptop under his jacket at the store.

When confronted, the man became irate, knocked down an employee, pulled a knife and ran toward the door. Outside were four SAS Troopers collecting toys for the “Toys For Tots” program. Smith said the Troopers stopped the man, but he stabbed one of them in the back. Fortunately the cut did not appear to be severe.

The suspect however was transported by ambulance to the Royal Perth Hospital with two broken arms, a broken leg, possible broken ribs, multiple contusions, and assorted lacerations including a broken nose and jaw … Injuries he apparently sustained when he tripped whilst trying to run away. One of the Troopers said, “He was a clumsy bastard.”

Short Review – Getting Started with Oracle Event Processing 11g

Having posted a number of long reviews regarding the Packt Publishing book Getting Started with Oracle Event Processing 11g here is a brief review (also posted to Amazon UK)

Although the book’s introduction says that its target audience is developers and architects the first few chapters are a very good introduction to the ideas and goals if Complex Event Processing (CEP) that would be easy to get to grips with by anyone in the IT industry, explaining the ideas and illustrating them with easy to grasp real examples.

As the chapters go on the book increasingly delves into the specifics of the Oracle solution providing illustrations of the different aspects of the product from Continuous Query Language (the heart of the CEP capability) to OSGi and how it can be used to effect easy deployment. That said, there is a lot here regarding general good practice, and provide insight into what should be expected from a good CEP platform.

Unlike a number of Packt books I’ve seen, this doesn’t simply take a step by step, screen by screen tutorial approach where you tend to get sucked into following the steps, the book focuses on what and why. This does mean that a bit more thought is needed to follow the examples through – but that is no bad thing in my opinion.

 

See posts below for a far more detailed write up on this excellent book.

Review of Getting Started with Oracle Event Processing 11g – Chapter 12

This is the final chapter of the Getting Started with Oracle Event Processing 11g, and unlike e rest of the book looks forward as to where Event Processing might go (and therefore Oracle) as well as a few observations on the Oracle solution itself. The obvious potential for Oracle is to bring the CEP tooling into JDeveloper rather than an Eclipse plugin as is presently the case.big JDeveloper gets the suggested changes (the book has no apparent link to Oracle product road map) would result in a more wizard centric approach to development.

In terms of technology approaches the only other major point made is the likely harmonization with SOA principles. What did surprise me is that the link to BAM (Business Activity Monitoring) and BPM (Business Process Monitoring) wasn’t made despite the ever shrinking gap between business views onto data such that a business would be able to respond to to analysed events rather than BI reports well after the event. The most fascinating piece of this chapter is the relationship between CEP and Big Data (Hadoop etc) and the idea CEP could filter out data, or use Hadoop as a data source.

The rest of the chapter focuses more on possible directions for event processing in general, such as smart homes, cheaper devices feeding back more data allowing dynamic management and tracking of objects such as shipping containers and predictive analytics.

A well written chapter, but then by now you’d expect nothing less, but perhaps not as informative as the rest of the book, but then this chapter is far more speculative.

Overall Alexandre Alves, Robin J. Smith and Lloyd Williams should be very proud of the book and I hope that it sells well. As I said previously, this maybe geared to the Oracle product, but the way it has been written you could take the concepts and ideas and you could be confident of having some solid foundation understanding on any CEP solution.

Useful Links

Review of Introduction to Oracle Event Processing – chapters 10 & 11

Tags

, , , , , , ,

The penultimate chapters don’t dive into the core Event Processing technology but look at some uses cases and the combination of CEP with Oracle’s spatial extensions and database capabilities. My initial reaction was that these chapters are perhaps more niche than I’d want, but when I thought a little longer it occurred to me that a lot of CEP use cases would include make use of spatial. Intact a system development I lead some years ago, if built today could be built using these features.

The book focuses on the idea of notifying people about a public transport service, but think about the great many mobile services evolving for smart phones given their push notification capability now you can see how e spatial features could offer a lot of value.

The chapters like everything else in this book are very well written, and worth reading.

If anything the questions left in my mind, are more commercial dimensions of such a technology – enterprise Oracle database which contains a number of the special feature is not cheap, and I’d imagine that the spatial cartridge isn’t cheap. This leads me to a natural next question, given the common application scenarios like e one described, has anyone stood up a SaaS service using this technology, and how cost effective/competitive/attractive would it be?

As you can see a thought provoking book.

Record Store–Wonderful Old Photos

Tags

The RecordStore have been using some marvellous old photos as part of their newsletters. I went looking for them so I could share them …

As it happens a lot of these photos show up at http://aziomedia.wordpress.com

 

If only my collection looked as good as this.