It's that time of the year again when our thoughts turn to gifts we'd like to receive. Laying aside the usual contributions of socks or sweaters with pictures of reindeer, the IDUG volunteers turned their mind to what they'd like from "The DB2 Santa Claus"
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag
Recently, we had a discussion with my colleagues about managing the column access in DB2 for z/OS via the column masks. One of my smart mates had a very good question - how do column masks work with joins? Let's look at this problem in more detail in the following short blog.
In the ideal development world, there would be unlimited computing resources available and creating development and testing environments would be an instantaneous and pain free process. In the real world...