(Rebecca Bond) Welcome to the first DB2 Security Magic Tricks Show. Today, I will demonstrate how I can read your mind.
Tag: IBM
APAR Friday: Its returned, but a day late, of course… (smile)
(Willie Favero) I was doing some reading this morning while having breakfast and came across a couple of APARs that I thought might be of interest. The titles in most cases speak for themselves. However, I’ll attempt to add a few interesting tidbits about a few of them to help things along.
Application environment migration with WebSphere CloudBurst
(Dustin Amrhein and Ruth Willenborg) In this tutorial, the authors demonstrate how to use WebSphere® CloudBurst to build patterns you can use to represent the configuration of both your application and application infrastructure. They also show you how to use these patterns to consistently deploy th
db2top: How to change column order and preserve it in the next session
(Keith McDonald) Over the next few db2top-related blog posts, I am planning to post some videos that demonstrate some of the features I wrote about in earlier posts. First up is the Change Columns Order screen and a video to demonstrate how to change the column order and keep it changed for the next
Simplify DB2 Express-C security
(Leons Petrazickis) Starting in DB2 9.7, the DB2 security model was changed. Security administration (SECADM) was split off from database administration (DBADM), and users with SECADM permissions could no longer peek at data, at least not by default.
Obfuscate your DDL statements (aHJgFSG127_henRIK)
(Henrik Loeser) It’s always interesting to take a look at the new functionality in a new (fixpack) release. DB2 9.7 FP2 adds functionality to obfuscate DDL statements. You might state that with all the parameters and options or page-long spaghetti code inside stored procedures DDL statements already
Improved zIIP redirect
(Willie Favero) What a great title for a blog post.
Build a high-performing knowledge base using IBM InfoSphere Classification Module
(Gang Zhan and Kuo Yang) The task of building a knowledge base from a large amount of unstructured data comprised of thousands, or even millions, of content items, can seem daunting. This article describes a fairly easy way to build a knowledge base using IBM InfoSphere Classification Module 8.7.
db2top Performance Report
(Keith McDonald) Up to now, we have been looking mostly at db2top as a tool for observing the behavior of your system in real-time, but background mode and recording and playback has shown us that db2top can produce and examine historical data as well. The db2top tool can also be used to perform an
Cataloging local and remote DB2 databases
(Leons Petrazickis) On Windows, uninstalling DB2 will remove the instance but keep the databases in place. After you reinstall, you’ll want to recatalog these databases. This is fairly straightforward.
