Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Master the art of data transformation with the second edition of this trusted guide to dbt.
Building on the foundation of the first edition, this updated volume offers a deeper, more comprehensive exploration of dbt's capabilities-whether you're new to the tool or looking to sharpen your skills. It dives into the latest features and techniques, equipping you with the tools to create scalable, maintainable, and production-ready data transformation pipelines.
Unlocking dbt, Second Edition introduces key advancements, including the semantic layer, which allows you to define and manage metrics at scale, and dbt Mesh, empowering organizations to orchestrate decentralized data workflows with confidence. You'll also explore more advanced testing capabilities, expanded CI/CD and deployment strategies, and enhancements in documentation-such as the newly introduced dbt Catalog.
As in the first edition, you'll learn how to harness dbt's power to transform raw data into actionable insights, while incorporating software engineering best practices like code reusability, version control, and automated testing. From configuring projects with the dbt Platform or open source dbt to mastering advanced transformations using SQL and Jinja, this book provides everything you need to tackle real-world challenges effectively.
What You Will Learn
Who This Book Is For
Current and aspiring data professionals, including architects, developers, analysts, engineers, data scientists, and consultants who are beginning the journey of using dbt as part of their data pipeline's transformation layer. Readers should have a foundational knowledge of writing basic SQL statements, development best practices, and working with data in an analytical context such as a data warehouse.
Dustin Dorsey is a data leader and architect who has been building and managing data solutions for more than 16 years. He is currently a leader in the data consulting space and works with companies of all sizes to modernize and scale their data analytics environments. A respected voice in the data community, Dustin is an international speaker and mentor. He has also organized several data community events and user groups in his local community of Nashville, Tennessee. Dustin is a co-author of the popular Apress books Pro Database Migration to Azure and Unlocking dbt.
Cameron Cyr is a data fanatic who has spent his career developing data systems that enable valuable use cases such as analytics and machine learning. He specializes in building reliable, scalable architectures with a strong emphasis on data quality. As a data consultant, Cameron provides engineering, architecture, and analytics services. He is also a co-author of Unlocking dbt.
Chapter 1: Introduction to dbt.- Chapter 2: Data Modeling.- Chapter 3: Setting Up?a?dbt Project.- Chapter 4: Sources and?Seeds.- Chapter 5: Models.- Chapter 6: Snapshots.- Chapter 7: Jinja, Macros, and?Packages.- Chapter 8: Hooks.- Chapter 9: Tests.- Chapter 10: Documentation.- Chapter 11: dbt in Production.- Chapter 12: dbt Mesh.- Chapter 13: Semantic Layer.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.