(Lockwood Lyon) Since you will be keeping your data in both the DBMS and in the appliance, your standard database design rules still apply. Interestingly, some of the rules are now expanded or more complex due to the existence of the appliance.
Tag: IBM
DB2 Backups When Using Native Encryption
(Ember Crooks) I’ve recently implemented native encryption for a small database on a server that is somewhat oversized on CPU and memory. One of the things I noticed after encrypting my database was both increased backup duration and increased backup size.
Using the InfoSphere MDM Application Toolkit to build MDM services in IBM Business Process Manager, Part 1: Introduction and considerations
(Robert H. Grant and Slava Zheltonogov) This is the first tutorial in a series that describes how to integrate IBM Business Process Manager (BPM) and IBM InfoSphere Master Data Management (MDM). Specifically, this series refers to IBM BPM 8.5.5 and the IBM InfoSphere MDM Application Toolkit, both of
Database Design Decisions for Big Data
(Lockwood Lyon) Since you will be keeping your data in both the DBMS and in the appliance, your standard database design rules still apply. Interestingly, some of the rules are now expanded or more complex due to the existence of the appliance.
DB2 Backups When Using Native Encryption
(Ember Crooks) I’ve recently implemented native encryption for a small database on a server that is somewhat oversized on CPU and memory. One of the things I noticed after encrypting my database was both increased backup duration and increased backup size.
Using the InfoSphere MDM Application Toolkit to build MDM services in IBM Business Process Manager, Part 1: Introduction and considerations
(Robert H. Grant and Slava Zheltonogov) This is the first tutorial in a series that describes how to integrate IBM Business Process Manager (BPM) and IBM InfoSphere Master Data Management (MDM). Specifically, this series refers to IBM BPM 8.5.5 and the IBM InfoSphere MDM Application Toolkit, both of
An Oft-Overlooked DB2 for z/OS Big Memory Exploitation Play
(Robert Catterall) Over the past few years, I’ve done a lot of writing and presenting and talking about ways in which large-scale z Systems memory resources (which I refer to as Big Memory) can be leveraged so as to enhance the performance of DB2 for z/OS subsystems and related applications.
The Lifecycle of Data
(Craig S. Mullins) Most data is not static. No, data has a life in which it changes, is used for perhaps multiple purposes, and gets moved all over the place. So it makes sense to think about the lifecycle of your data at your organization.
SELECT FROM data change table on DB2 for z/OS
(Emil Kotrc) I am a big fan of minimizing the calls to DB2 and run as few SQL as possible. That is one of the reason I like the MERGE statement although it is a bit limited in DB2 for z/OS. In this short blog I would like to mention another of my favorite SQL tricks – SELECT FROM data-change-table-r
An Oft-Overlooked DB2 for z/OS Big Memory Exploitation Play
(Robert Catterall) Over the past few years, I’ve done a lot of writing and presenting and talking about ways in which large-scale z Systems memory resources (which I refer to as Big Memory) can be leveraged so as to enhance the performance of DB2 for z/OS subsystems and related applications.
