(Craig S. Mullins) Most database implementations are anything but static. Once deployed, databases are queried, updated, loaded, unloaded, reorganized, and data is deleted and inserted from them on an ongoing basis. And data may be replicated to and from the database on a regular basis, too.
Tag: IBM
DB2 Tips n Tricks Part 72 – How db2 get instance displays incorrect instance
(Harishkumar Baburao Pathangay) How db2 get instance displays incorrect instance How to Switch between multiple instances Solution:
TechTip: How to Use the Multi-Temperature Storage Feature in DB2
(Mohankumar Saraswatipura) The amount of data stored in enterprise data warehouse environments is growing at an exponential rate. At the same time, the end-user experience expectations are getting higher and higher. The challenge here is to store enormous amount of data without impacting application
Database Capacity Planning
(Craig S. Mullins) Most database implementations are anything but static. Once deployed, databases are queried, updated, loaded, unloaded, reorganized, and data is deleted and inserted from them on an ongoing basis. And data may be replicated to and from the database on a regular basis, too.
DB2 Tips n Tricks Part 72 – How db2 get instance displays incorrect instance
(Harishkumar Baburao Pathangay) How db2 get instance displays incorrect instance How to Switch between multiple instances Solution:
TechTip: How to Use the Multi-Temperature Storage Feature in DB2
(Mohankumar Saraswatipura) The amount of data stored in enterprise data warehouse environments is growing at an exponential rate. At the same time, the end-user experience expectations are getting higher and higher. The challenge here is to store enormous amount of data without impacting application
Column Masking With Fewer Restrictions
(Troy L Coleman) For at least as long as there’s been a public Internet, there’s been a need to mask sensitive personal data. Of course many different software solutions are available in the market today, including IBM’s built-in column masking feature that was introduced with DB2 10 for z/OS.
What’s new in IBM Security Guardium V10
(Kathryn Zeidenstein) In Version 10, IBM Security Guardium takes a major step forward with intelligence and automation to safeguard data, enterprise-readiness features, and increased breadth of data sources, including file systems.
Database Design in the Era of Big Data — Design for Quality Assurance
(Lockwood Lyon) What does a quality database design mean? Generally speaking, a database design starts with a model of the data and the business rules that define their relationships.
Column Masking With Fewer Restrictions
(Troy L Coleman) For at least as long as there’s been a public Internet, there’s been a need to mask sensitive personal data. Of course many different software solutions are available in the market today, including IBM’s built-in column masking feature that was introduced with DB2 10 for z/OS.
