Technical Content

IDUG News Technical Content

Can Db2 for z/OS be configured to be secure and compliant? Yes. Db2 can be configured to be secure and compliant by leveraging the various security...

Read Post

Logical Schema Backup and Restore for Columnar Tables: Part 2 – Troubleshooting Logical Backup and Restore operations This article is Part 2 of a...

Read Post

Can Db2 be hacked? Yes, sure it can. This answer could conclude the article, but as always, there is more. Yes, Db2 can be hacked, but if not...

Read Post

Encryption of “Data on the Wire” with TLS (Tranport Layer Security), formerly known as SSL, is more and more mandatory, also in the Db2 for LUW and...

Read Post

In Chapter 2 of this series, Gerry addressed the following frequently asked question, "Can I make custom configuration changes to the Db2 Pacemaker...

Read Post

Before you migrate to any new Db2 release such as Db2 13 you usually do a migration readiness planning. Part of this planning is running the...

Read Post

I joined IBM shortly after I graduated from the University of North Texas back in 2019. I was full of excitement and eager to embark on my first...

Read Post

In the last year a bit of a revolution has emerged in the Business Intelligence (BI) space, with the introduction of watsonx.data, IBM’s newest data...

Read Post

As you know, the cost of data warehouses is significantly dependent on the cost of storing significant amounts of data, and implementing COS support...

Read Post

I've got the Db2 instance up and running now, am I production ready?

Read Post

IBM provides a cloud-based version of Db2 LUW.  It is a full version of Db2 LUW Version 11.5.  The Db2 in the cloud can be very powerful and highly...

Read Post

If you would have asked me one month ago to come up with a query that coughs up missing numbers, I would have told you that there is no such a need...

Read Post