Anomaly Detection is a hot topic these days, but you don't need to do coding to start with this. In this article, we'll do Anomaly Detection using only SQL statements new to Db2.
The IDUG Db2 Tech Conference is not only about Db2 anymore. In the past, the scope was limited to pure Db2-related in-depth functions and features for DBAs and application programmers. Today, IDUG offers a broader perspective, addressing additional topics.
Data Architecture is not only related to the mere constellation of technical components that should work together. A data architecture should also reply to the needs of an end user and eventually establish an information architecture that is not only fit for use, but also fit for purpose.
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag