By Marina Greenstein – Changes in your database often mean changes to your application. This article explains the steps necessary during Oracle Pro*C program conversion to C with embedded DB2 SQL calls.
Tag: IBM
Improving buffer performance
by Barrie Sosinsky – Check out this and other tips at SearchDatabase.com.
Architectures for Clustering: Shared Nothing and Shared Disk
By Craig S. Mullins – Clustering can bring extra computing power and improved availability. Choosing the architecture that makes sense with your hardware and software makes all the difference.
DB2 Universal Database Administration Fastpath for V7 (CT28C)
This course is intended for relational database administrators, skilled on other platforms, who are responsible for implementing and maintaining a DB2 UDB V7 system.
What are the maximum limits for segmented and partitioned tablespaces
with Robert Catterall – We have a segmented tablespace growing over the 2G dataset limit that’s now in the second 2G dataset. But we don’t have the proper operations window to convert the tablespace into a partitioned tablespace. What is the maximum limit (in GBs) for a segmented tablespace?
IBM Stumping for WebSphere on Windows
As more enterprises find themselves adding Windows machines amongst Unix, Linux, and mainframes, IBM concentrates on communicating competitive advantages in security and scalability—even in a platform polyglot.
DB2 Data Bound ASP.NET Form Using VS.NET
This tutorial from Visual Studio .NET expert Abdul Al-Azzawe demonstrates how to use the DB2 Development Add-In for VS .NET to build a rich ASP.NET WebForm in C# using design-time and run-time data binding.
IBM patching DB2 vulnerability
By Paul Roberts – IBM released a software patch for a serious security vulnerability in some versions of its DB2 Database, according to the security company that discovered the problems.
New DB2 Flaws Could Prove Troublesome
(Dennis Fisher) Security experts have discovered two new vulnerabilities in IBM’s DB2 database software, both of which allow an attacker to gain root privileges on vulnerable servers. The weaknesses are potentially quite dangerous, considering that DB2 is one of the most popular enterprise da
DB2 Archive Log Accelerator, V2
IBM DB2 Archive Log Accelerator (formerly DB2 Archive Log Compression Tool) reduces the overhead that is associated with database log management to balance the increases in archive log growth. The tool achieves this using a combination of data striping (for faster log volume through-put) and DFSMS h