Technical Content

IDUG News Technical Content

Are you looking for a simple solution to deploy your Python machine learning model and integrate it with other applications? IBM Db2 can help you...

Read Post

There is no easy way to share information between the SQL statements among applications. This creates a need for applications to put supporting...

Read Post

The information about your database objects are stored in the Db2 catalog as we explained in our past blog. You manipulate your database objects...

Read Post

It is possible to experience SQLCODE -805 after a product or application release because a BIND of a DBRM was missed. When this happens, it can take...

Read Post

Authored by Kostas Rakopoulos, Hamdi Roumani, and Christian Garcia-Arellano In the journey of adding Cloud Object Storage (COS) support to Db2...

Read Post

As we live in challenging times, are leaving the traditional on-premises datacenter and are using more and more cloud-based IT offerings, increased...

Read Post

This article describes how the Db2 optimizer is evolving into the next generation Db2 AI optimizer. Query optimizers have evolved from a heuristic...

Read Post

You are preparing to leave Friday afternoon, maybe a little early to beat traffic to the cottage. You do one last health check on your cluster, and...

Read Post

Can Db2 for z/OS be configured to be secure and compliant? Yes. Db2 can be configured to be secure and compliant by leveraging the various security...

Read Post

Logical Schema Backup and Restore for Columnar Tables: Part 2 – Troubleshooting Logical Backup and Restore operations This article is Part 2 of a...

Read Post

Can Db2 be hacked? Yes, sure it can. This answer could conclude the article, but as always, there is more. Yes, Db2 can be hacked, but if not...

Read Post

Encryption of “Data on the Wire” with TLS (Tranport Layer Security), formerly known as SSL, is more and more mandatory, also in the Db2 for LUW and...

Read Post