The IDUG Db2 Tech Conference is not only about Db2 anymore. In the past, the scope was limited to pure Db2-related in-depth functions and features for DBAs and application programmers. Today, IDUG offers a broader perspective, addressing additional topics.
Data Architecture is not only related to the mere constellation of technical components that should work together. A data architecture should also reply to the needs of an end user and eventually establish an information architecture that is not only fit for use, but also fit for purpose.
Without proper management and governance, a data lake can easily turn into a manageability problem. In this article, David Stevens previews the session he will be delivering at the upcoming IDUG Data Tech Summit.
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag
In this article Saurabh Agrawal discuss a technique utilized to shorten the amount of time it takes to purge a large amount of data from a DB2 for LUW database. The article includes a very detailed description of the process along with some script examples.