I want to be able to set things up so that my end-users can monitor and cancel their own queries without having to come to me. Is there a way I can do this?
We want to know what hardware acceleration is leveraged by DB2 Native Encryption, how we enable it, what code levels we need to be on, and how can we tell it is active?
We are planning to use DB2 Native Encryption and I am wondering what type of impact we should expect to see on our application performance?
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag
Recently, we had a discussion with my colleagues about managing the column access in DB2 for z/OS via the column masks. One of my smart mates had a very good question - how do column masks work with joins? Let's look at this problem in more detail in the following short blog.