Pittsburgh Regional DB2 User Group

Marlene Gaydos

Pittsburgh Regional DB2 User Group




Pittsburgh Regional DB2 User Group

Date: Tuesday, December 7th, 2004
Place: Highmark Caring Place
Cost: FREE
Reservations: Email or Call: [login to unmask email]
412.544.5352
[login to unmask email] 412.544.7006

For details and directions: See http://www.db2parug.org


Agenda for December 7th, 2004
8:30 to 9:00 Breakfast, Compliments of Computer Business
International, Inc.

9:00 to 10:15 Don't Toss It! Store It with DB2 Stored Procedures
Presenter: Mark Thomas, Highmark
Applications are moving to the web riddled with new application
bugs, with high development costs, and slower response time. In
many of these situations, the business logic stays the same but
the existing code is thrown out and replaced. This presentation
will cover using stored procedures within PeopleSoft, but will
also give valuable insight on using stored procedures in any
Web application.

10:15 to 10:30 Break

10:30 to 11:45 The DB2 Top Ten Lists (Application Development)
Presenter: Craig Mullins, BMC Software
This presentation will offer a series of informative tips,
techniques, and guidelines for managing and accessing DB2
databases. But the information will be conveyed in a novel way
- as a series of Top Ten lists. Sort of like the lists David
Letterman might write if he were a DBA.

11:45 to 12:15 Lunch, Compliments of BMC Software

12:15 to 12:45 Lunch and Learn Session, Compliments of BMC Software
Presenter: Craig Mullins, BMC Software

12:45 to 1:00 Break

1:00 to 2:15 DB2 Database Design: From Logical to Physical
Presenter: Craig Mullins, BMC Software
Properly designed DB2 databases are critical to the usability
and performance of the resulting databases and application that
use them. This presentation covers the discipline of designing
proper relational databases from initial specifications through
the conceptual and logical data modeling phase and out to the
final physical database structures. In other words – database
design from inception to implementation

2:15 to 2:30 Break with afternoon snack – sponsored by Computer
Business International, Inc.

2:30 to 3:45 Coding Secure DB2 Applications
Presenter: Rick Nall, Computer Business International, Inc.
Nearly every security problem ever discovered can be traced
back to badly written code. Applications do the job they’re
supposed to do, but are written in a way that malicious users
can use them to do much more than the developer intended, like
bypassing authentication checks, exposed credit card
information, medical records and other sensitive data.