In this second installment of the Anomaly Detection articles, we will explore another practical way to do Anomaly Detection in Python, and then we'll use what we just learned to do the same in pure SQL that you can insert anywhere.
The IDUG Db2 Tech Conference is not only about Db2 anymore. In the past, the scope was limited to pure Db2-related in-depth functions and features for DBAs and application programmers. Today, IDUG offers a broader perspective, addressing additional topics.
Data Architecture is not only related to the mere constellation of technical components that should work together. A data architecture should also reply to the needs of an end user and eventually establish an information architecture that is not only fit for use, but also fit for purpose.
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for manag