When using LDAP in DB2 to check who had access to a database and which items are available to a user works fine even though looking at db2diag.log you might wonder. The number of messages passing by in that file makes you aware how many checks are done while going thru the data in your databases.
A few days ago, I received an urgent question about how to protect sensitive data stored in a table on their database server. Her boss wanted to make it easy for team members to get the information so they could do testing.
October is Backup and Recovery month. It is also the month of goblins, ghouls and scary stories. Kurt Struyf tells us that these two themes often go together. Kurt presents a horror story of what can go terribly wrong when you don't have a good backup and recovery strategy.
In this session from the IDUG 2014 Technical Conference in North America, Randy Ebersole highlights some of the new features of DB2 11. He introduces some of the new functionality to get you thinking about moving to DB2 11!
Welcome to the DB2 Beginner's Blog! We are planning some great content for people who are new to DB2 on all platforms in any job responsibility.