The importance of the UNLOAD privilege in Db2 12 for z/OS cannot be underestimated as it can completely determine if your batch production can run untouched. Whether it's for better control and audits or more granularity in privileges, Brian Laube explains why we should keep this in mind.
As many other I got challenged to set up a database architecture. Not only database objects related, describing the different environments was also asked and there was an urgent need for a decent security setup to support rollouts in general.
Help Db2 security RFEs get the attention they deserve by voting for your favorites!
I want to be able to set things up so that my end-users can monitor and cancel their own queries without having to come to me. Is there a way I can do this?
We want to know what hardware acceleration is leveraged by DB2 Native Encryption, how we enable it, what code levels we need to be on, and how can we tell it is active?