Without proper management and governance, a data lake can easily turn into a manageability problem. In this article, David Stevens previews the session he will be delivering at the upcoming IDUG Data Tech Summit.
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag
In this article Saurabh Agrawal discuss a technique utilized to shorten the amount of time it takes to purge a large amount of data from a DB2 for LUW database. The article includes a very detailed description of the process along with some script examples.
This month’s third article is by John Maenpaa. John provides us with the overview of a real life project. The choice was between JSON, XML and traditional relation structure, in order to store complex forms. John talks about measurements and considerations. This article is a must read.
Join Judy Ruby-Brown has she gives a thorough overview of system level backup and using FlashCopy for disaster recovery as provided by various vendors. Judy explains the types of services that need to be setup for disaster recovery as well as easy implementation scenarios for the DBA.