Greetings! The agenda for next week's UG event has changed slightly. Judy
Nall will be presenting on the V8's On-Line Schema Evolution and Versioning
immediately after our lunch & learn period. Please RSVP to
[login to unmask email] to register if you have not already responded. The
agenda / directions can be found @ http://www.db2parug.org. I have also
attached the agenda below for those w/i internet access. Tks. Seeya
Central Pennsylvania Regional DB2 User Group
Date: Wednesday, December 8th, 2004
Place: Camp Hill Corporate Center, Building 300, Large Auditorium
Reservations: Email or call: [login to unmask email] (717) 302-1723
For details and directions: See http://www.db2parug.org
Agenda for December 8th, 2004
8:30 to 9:00 Breakfast, Compliments of Computer Business
9:00 to 10:15 Don't Toss It! Store It with DB2 Stored Procedures
Presenter: Mark Thomas, Highmark
Applications are moving to the web riddled with new application bugs, with
high development costs, and slower response time. In many of these
situations, the business logic stays the same but the existing code is
thrown out and replaced. This presentation will cover using stored
procedures within PeopleSoft, but will also give valuable insight on using
stored procedures in any Web application.
10:15 to 10:30 Break
10:30 to 11:45 The DB2 Top Ten Lists (Application Development)
Presenter: Craig Mullins, BMC Software
This presentation will offer a series of informative tips, techniques, and
guidelines for managing and accessing DB2 databases. But the information
will be conveyed in a novel way - as a series of Top Ten lists. Sort of
like the lists David Letterman might write if he were a DBA.
11:45 to 12:15 Lunch, Compliments of BMC Software
12:15 to 12:45 Lunch and Learn Session, Compliments of BMC Software
Presenter: David Geiger, BMC Software
12:45 to 1:00 Break
1:00 to 2:15 On-Line Schema Evolution and Versioning
Presenter: Judy Nall, Computer Business International, Inc.
Have you ever wanted to make a simple change to a column length or data
type in a table but not go through a series of steps to drop and re-create
of the object to make it happen? Now you can! DB2 Version 8 has turned
object ALTERing into an On-Line process. Let’s take a look at how this DB2
UDB for z/OS Version 8 seeming simple process works and uncover the
complexities you might encounter along the way.
2:15 to 2:30 Break with afternoon snack – sponsored by Computer
Business International, Inc.
2:30 to 3:45 Coding Secure DB2 Applications
Presenter: Rick Nall, Computer Business International, Inc.
Nearly every security problem ever discovered can be traced back to badly
written code. Applications do the job they’re supposed to do, but are
written in a way that malicious users can use them to do much more than the
developer intended, like bypassing authentication checks, exposed credit
card information, medical records and other sensitive data.