Articles & Content


Exploiting the logs many possibilities (E06)

Topic: 2005 EU

Subtopic: Cross Platform DB2 for z/OS & LUW

DATE: 2005-10-25 (08:30 - 09:30)
SPEAKERS: Steen Rasmussen (Computer Associates)

The log is a vital part of DB2 and DB2 recovery. However - once you start to exploit the content, many day to day tasks can be changed for the better for everyone. This presentation will look into real life scenarios how DB2 sites are squeezing the most out of the log to manage audit control, application recovery, change propagation, application QA and assisting in disaster scenarios.

EXP. LEVEL: Beginner,Intermediate


Data capture Changes - truths and myths

Change propagation

Application recovery

Application quality assurance

Disaster recovery scenarios

This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.