January 31, 2008
I was just reading one of our author’s blog – Carl Kessler, author of Outside-in Software Development: A Practical Approach to Building Successful Stakeholder-based Products.
I have taken the liberty to post his entry at the start of 2008.
“Three simple resolutions can get you going down the path of delivering more successful products. You can get started today:
1. Figure out who your product’s stakeholders really are. You probably already know to think about your end-users. Get in the habit of considering two other stakeholders as well: partners and insiders.
Partners are the folks who have to put your product into production and keep it running. They might be in your client’s IT shop or might be third-party service providers. Think about making it easy for these folks to keep your product running well; it will pay off big-time.
Also try to identify all your product’s insider stakeholders. These are the folks in your own organization who have a stake in the product you ship and who affect your work in some measurable way. Insiders may include your finance, sales, support, or architecture and standards teams.
The key question for insiders is the same as for all other stakeholders: what do they need from you to be most successful? We often don’t think about this question enough, especially for insiders. For example, ask your sales team what they most need. You might find out it is a set of early demos, or you might gain vital intelligence about the features that really matter in competitive sales scenarios. Similarly, ask you support team what it would take to fix clients’ problems faster. There’s much to learn here.
2. Focus on your product’s consumability. In other words, how easy is it for everyone who has to deal with your product to do so easily and productively? This can generate a wide range of questions, such as: is it easy to figure out how much CPU or memory is required to use your product in some standard production situations? Can it be readily installed and integrated with other systems? Do your end-users require training to take advantage of key features, and how can you minimize the cost and time required, make it fun, or at least provide it in a way that helps your users feel smart?”
Here’s infomation on Carl’s book:
In Outside-in Software Development, two of IBM’s most respected software leaders, Carl Kessler and John Sweitzer, show you how to identify the stakeholders who’ll determine your project’s real value, shape every decision around their real needs, and deliver software that achieves broad, rapid, enthusiastic adoption.
The authors present an end-to-end framework and practical implementation techniques any development team can quickly benefit from, regardless of project type or scope. Using their proven approach, you can improve the effectiveness of every client conversation, define priorities with greater visibility and clarity, and make sure all your code delivers maximum business value.
- Understanding your stakeholders and the organizational and business context they operate in
- Clarifying the short- and long-term stakeholder goals your project will satisfy
- More effectively mapping project expectations to outcomes
- Building more “consumable” software: systems that are easier to deploy, use, and support
- Continuously enhancing alignment with stakeholder goals
- Helping stakeholders manage ongoing change long after you’ve delivered your product
- Mastering the leadership techniques needed to drive outside-in development
At IBM Press, we think this is a great book. But don’t just take my word for it – check this out:
Carl let his readers know the book is up for an award:
“The annual Jolt Award finalists were announced on December 21st. The idea of the Jolts is to “recognize the most innovative, trend-making, ahead-of-the-curve products. Jolt-award winners are the software products, books and websites that developers should be using today.”
And, wow, “Outside-in Software Development” is a finalist! What makes this particularly exciting is the strength of the entries, as the other finalists are also really good. I don’t envy the decision making task of the 19 industry leaders who are the judges.
If you’re looking for some good reading as we go into the new year, you can’t go wrong to check out the list of past Jolt Award winners – there are some great books there.”
January 30, 2008
What a difference a few years make. We published our first IBM Press book on IBM Rational in 2005. Fast forward to 2008 and we have 10 books in the Portfolio. The titles are diverse and represent some of our best thinkers.
|An Introduction to IBM Rational Application DeveloperUsing this book’s method, readers quickly learn IBM Rational Application Developer—regardless of their previous level of experience or inexperience. For beginners, there are tutorials that teach how to create Web, EJB, JMS, and Web Services applications using Rational Application Developer. For the more advanced readers, there are tutorials on security, publishing, testing, team development, profiling, and logging. Written to appeal to as broad an audience as possible, the tutorials run on common databases, including IBM Cloudscape, IBM DB2® Universal Database, Microsoft® SQL Server, Sybase® Enterprise Systems, and Oracle® Database.
|IBM Rational ClearCase, Ant and CruiseControl: The Java Developer’s Guide to Accelerating and Automating the Build Process
No previous build experience is necessary: Lee thoroughly explains everything from configuring SCM environments and defining build scripts through to release packaging and deployment. He offers solutions and techniques for both Base ClearCase and Unified Change Management (UCM)–IBM Rational’s best practice Software Configuration Management usage model. Key techniques are presented in real-world context, through a full-fledged three-tier application case study.
|IBM Rational Unified Process Reference and Certification Guide: Solution Developer
The first and only official RUP certification guide, this book fully reflects the latest versions of the Rational Unified Process and of the IBM RUP exam. Authored by two leading RUP implementers, it draws on extensive contributions and careful reviews by the IBM RUP process leader and RUP certification manager.
|Implementing IBM Rational ClearQuest: An End-to-End Deployment GuideBrings together all you need to integrate ClearQuest into an overarching change-management system that works. Drawing on decades of experience, the authors present a detailed, easyto-use roadmap for each step of ClearQuest deployment, from evaluating business cases through planning, design, and implementation. You will find the industry’s clearest, most useful explanations of ClearQuest technology here, along with real-world examples, best practices, diagrams, and actionable steps.
|Implementing the IBM Rational Unified Process and Solutions Using this book’s method, readers quickly learn IBM Rational Application Developer—regardless of their previous level of experience or inexperience. For beginners, there are tutorials that teach how to create Web, EJB, JMS, and Web Services applications using Rational Application Developer. For the more advanced readers, there are tutorials on security, publishing, testing, team development, profiling, and logging. Written to appeal to as broad an audience as possible, the tutorials run on common databases, including IBM Cloudscape, IBM DB2® Universal Database, Microsoft® SQL Server, Sybase® Enterprise Systems, and Oracle® Database.
|Project Management with the IBM Rational Unified Process: Lessons from the Trenches
This is the definitive guide to managing software development projects with the IBM Rational Unified Process (RUP®). Drawing on his extensive experience managing projects with the RUP, R. Dennis Gibbs covers the entire development lifecycle, from planning and requirements to post-mortems and system maintenance. Gibbs offers especially valuable insights into using the RUP to manage outsourced projects and any project relying on distributed development teams—outsourced, insourced, or both.
|Requirements Management Using IBM Rational RequisiteProUtilizing a start-to-finish sample project, requirements expert Peter Zielczynski introduces an organized, best-practice approach to managing requirements and shows how to implement every step with RequisitePro. You’ll walk through planning, eliciting, and clarifying stakeholder requirements; building use cases and other key project documents; managing changing requirements; transforming requirements into designs; and much more. Every stage of the process is illuminated with examples, realistic artifacts, and practical solutions.
|Software Configuration Management Strategies and IBM Rational Clearcase, 2nd editionThe authors each draw on more than 15 years of SCM experience, and the knowledge of working with IBM Rational field teams in customer engagements worldwide. They systematically cover SCM planning and deployment, and SCM’s use throughout the entire project lifecycle: development, integration, building, baselining, release deployment, and beyond. They offer practical guidance on addressing challenges that arise as projects grow in size and complexity, from managing geographically distributed teams to tracking change requests.
|Visual Modeling with IBM Rational Software Architect and UMLRenowned UML expert Terry Quatrani and J2EE/SOA evangelist Jim Palistrant walk you through visualizing all facets of system architecture at every stage of the project lifecycle. Whether you’re an architect, developer, or project manager, you’ll discover how to leverage IBM Rational’s latest innovations to optimize any project.
January 29, 2008
A global bank with a mainframe computer has enormous security risks. The grandma in Boca Raton with an internet connection has risks too. Little people – little problems. Big people – big problems. But a problem is still a problem. At IBM Press we just published our third book on security. I am suprised we didn’t have more books on this topic before 2007 – but am thrilled with the books we now have in the marketplace.
I recently had a comment on this blog that I did not provide enough information about a particular book – so from on – I will include the Table of Contents or books description. Hope that helps.
Here’s our three security books:
Understanding DB2 9 Security by Rebecca Bond, Kein Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Keun Henry Chan
- Establishing effective security processes, teams, plans, and policies
- Implementing identification and authentication controls, your first lines of defense
- DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
- Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
- Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
- Auditing and intrusion detection: crucial technical implementation details
- Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
- Staying current with the latest DB2 security patches and fixes
Chapter 1 Introduction to the Mainframe 1
1.1 Why Use a Mainframe? 1
1.2 Getting Started 4
1.3 Job Control Language (JCL) 7
1.4 z/OS UNIX System Services 19
1.5 Getting Help 22
1.6 Additional Information 25
Chapter 2 Users and Groups 27
2.1 Creating a User 27
2.2 How to Modify a User for OMVS Access 31
2.3 Groups 36
2.4 zSecure 42
2.5 Additional Information 43
Chapter 3 Protecting Data Sets and Other Resources 45
3.1 Protecting Data Sets 45
3.2 Other Resources 57
3.3 Security Data (Levels, Categories, and Labels) 64
3.4 Securing UNIX System Services (USS) Files 68
3.5 zSecure 70
3.6 Additional Information 71
Chapter 4 Logging 73
4.1 Configuring Logging 73
4.2 Generating Reports 82
4.3 UNIX System Services (USS) Logging 91
4.4 Logging in zSecure 95
4.5 Additional Information 97
Chapter 5 Auditing 99
5.1 Auditing 99
5.2 The RACF Data Security Monitor (DSMON) 100
5.3 The Set RACF Options (SETROPTS) Command 108
5.4 The RACF Database Unload Utility (IRRDBU00) 110
5.5 The RACF Health Checks 114
5.6 zSecure Auditing 118
5.7 Additional Information 120
Chapter 6 Limited-Authority RACF Administrators 121
6.1 Profiles Owned by Users 121
6.2 Group-Owned Profiles and Group Authorities 122
6.3 System-Level Authorities 128
6.4 Manipulating Users 129
6.5 Additional Information 133
Chapter 7 Mainframes in the Enterprise-Wide Security Infrastructure 135
7.1 What Is an Enterprise? 136
7.2 Enterprise Security Administration 144
7.3 Communicating between Enterprises–and Beyond 148
7.4 Additional Information 149
A Practical Guide to Trusted Computing by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
- What services and capabilities are provided by TPMs
- TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments
- Using TPM to enhance the security of a PC’s boot sequence
- Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more
- Linking PKCS#11 and TSS stacks to support applications with middleware services
- What you need to know about TPM and privacy–including how to avoid privacy problems
- Moving from TSS 1.1 to the new TSS 1.2 standard
- TPM and TSS command references and a complete function library
January 28, 2008
Chris Anderson, author of The Long Tail, has been blogging about his new book which will explore the concept of “Free”. Yep. The radical price of zero.
I used to pay a monthly fee to read Maureen Dowd’s column in the New York Times. Not any more as the Times no longer charges a subscription fee. Tripadvisor.com is free. For me, it has 100% replaced my need to buy a travel book. For every vacation I was planning I would stock up on multiple books on a particular destination and dog ear pages with my yellow highlighter in hand. I have not bought a travel book in five years.
At IBM, we have been giving away Redbooks for decades. You cannot imagine how much time an effort goes into producing these. And they are all free. Thousands of them.
At IBM Press, we charge for books. But the majority of our books offer a free chapter. So there’s “something for nothing”!
To download a free chapter, simply find a book you are interested in and in the middle of page you will see a section called “More Information”. In this section you will find the book’s sample chapter.
Click here for available books.
January 25, 2008
Posted by Ellice under Published books
It’s great when a book comes out and is perfectly timed. “Do it Wrong Quickly – How the Web Changes the Old Marketing Rules” is one of those books.
Do it Wrong Quickly is on a roll. The Miami Hearald name it one of its business books of the year for 2007. It has also been named a book of the week. Mike Moran is one of the best selling authors for IBM Press and I could give you a hundred reasons why. But I thought I would let some of five star reviews on Amazon.com do the talking for me today.
“I absolutely love Mike Moran’s take on Internet marketing. Do It Wrong Quickly is not about how to do Internet marketing wrong, it’s about how to not get caught up in having to do it right so that you’ll do something now.”
“Well worth the time and money. I can’t imagine you could read this book and not do a few things better, smarter and more profitably.”
“I think so highly of “Do It Wrong Quickly” that I bought a bunch of the books to give to clients and friends in the business.”
Mike is a doer at IBM, a great speaker and teacher, blogger and lucky for us – a great author.
January 24, 2008
The majority of the books we publish at IBM Press are on IBM products – Websphere, Rational, DB2, Lotus etc… In the past few years we have been publishing many more books on business topics and emerging technologies. We like being relevant. We like that we have authors who are smart as heck on hundred (thousands) of topics. Here’s a new book on ITIL from one of those smart as heck authors – Implementing ITIL Configuration Management.
ITIL is hot right now – and in the news everyday. We’re hoping this book is hot too!
January 21, 2008
Posted by Ellice under Published books
When I first read the proposal for Reaching the Goal: How Managers Improve a Services Business Using Goldratt’s Theory of Constraints, my reacation was, “Yikes – this is heavy stuff”. For manufacturing companies TOC was groundbreaking. Once I got my head around it – it really become practical to me. I mean we are all faced with constraints – time, money, expertise. Seems like I have 10 constraints a week in my personal and business life.
John Ricketts, the author of Reaching the Goal, sat down and answered some questions for me. The following is a good read for getting your head around this topic. I honestly believe his work is groundbreaking for a services company.
Reaching the Goal takes a highly regarded contemporary management paradigm into brand new territory,” says John Ricketts, IBM Distinguished Engineer in IBM Global Services. “For the past 25 years, The Goal by Eli Goldratt has been a best-selling business novel that tells the story of a factory on the verge of collapse and how it’s rescued by managers who focus their attention on the constraint that limits what the factory can produce. With the guidance of a character named “Jonah,” their actions defy conventional wisdom, but they eventually save the factory – and they do it using only the capacity they already have.”
This body of knowledge is known as Theory of Constraints, or just TOC. Three out of four leading manufacturers today have implemented it, but hardly any service providers have. The reason is simple: Service providers face different constraints than manufacturers. Yet the principles behind TOC are compelling enough to make it seem like TOC should apply to any enterprise.”
In a nutshell, what is Theory of Constraints?TOC is a set of management methods based on a few key principles. For example, just as a chain is only as strong as its weakest link, a company is only able to produce as much as its constraint will allow. Improving productivity of anything other than the constraint won’t improve productivity of the company overall, yet that is precisely what companies attempt to do when they tell every manager to optimize his or her own zone of responsibility. The result is most managers feel pain points that come from well-intentioned efforts by other managers to optimize just their parts of the business. In contrast, TOC says stop the madness, home in on the overall constraint, and focus improvements there. Furthermore, TOC recognizes that just as it’s easier to pull a chain than push it, a company produces more when it stops pushing things into production, in the hope that customers will eventually buy them, and starts letting the market pull things through production. A consistent finding from TOC implementations is thus that most companies have considerable latent capacity that was previously lost in the confusion.
Can you provide some examples of constraints in services organizations?
Some services organizations have a resource constraint: They can’t hire, train, and retain enough people with the critical skills that customers demand. Some have a production constraint: They can’t deliver services at the speed, cost, place, or quality that customers demand. Some have a market constraint: They can produce considerably more than their customers will buy. However, almost every services organization has an information constraint: They have no way to know what mix of services would produce the most profit.
How can TOC be applied to a services company?
TOC in manufacturing has grown over the years to cover more than just factory operations. It now includes applications for distribution, engineering, accounting, marketing, and sales. And its Thinking Process applies to strategy and change. Reaching the Goal (RTG) explains how each of the applications has been adapted for services. For example, rather than using the operations application in a factory, RTG adapts it for business processes. Rather than using the distribution application on goods, RTG adapts it to resource management. And rather than using the engineering application on recurring product development projects, RTG adapts it for diverse services projects.
Next Page »