(Ozair Sheikh and David P. Moore) In Part 1 of this tutorial series, you learned how to deploy the ISAM reverse proxy on IBM DataPower Gateway to enforce access to a mobile application. The reverse proxy was then combined with a Multi Protocol Gateway to provide additional API security and integrati
Tag: IBM
Influencing the DB2 Optimizer: Part 4 – OPTIMIZE FOR n ROWS
(Craig S. Mullins) In the first installments of this series of posts on ways to influence the DB2 optimizer we looked at standard methods like RUNSTATS and SQL tweaking techniques. Today, we will look at yet another method of influencing access path selection: specifying the OPTIMIZE FOR n ROWS for
Analyzing Package Cache Size
(Ember Crooks) I have long been a fan of a smaller package cache size, particularly for transaction processing databases. I have seen STMM choose a very large size for the package cache, and this presents several problems:
Protecting mobile applications with the ISAM module for IBM DataPower Gateway, Part 2: Creating and applying multi-factor authentication policies using one-time passwords
(Ozair Sheikh and David P. Moore) In Part 1 of this tutorial series, you learned how to deploy the ISAM reverse proxy on IBM DataPower Gateway to enforce access to a mobile application. The reverse proxy was then combined with a Multi Protocol Gateway to provide additional API security and integrati
Influencing the DB2 Optimizer: Part 4 – OPTIMIZE FOR n ROWS
(Craig S. Mullins) In the first installments of this series of posts on ways to influence the DB2 optimizer we looked at standard methods like RUNSTATS and SQL tweaking techniques. Today, we will look at yet another method of influencing access path selection: specifying the OPTIMIZE FOR n ROWS for
Analyzing Package Cache Size
(Ember Crooks) I have long been a fan of a smaller package cache size, particularly for transaction processing databases. I have seen STMM choose a very large size for the package cache, and this presents several problems:
Use Guardium outlier detection to detect hidden threats
(Kathryn Zeidenstein, Oded Sofer, Allon Adir and Rosa Miroshnikov) Learn how Guardium database monitoring is extended with enhanced security intelligence—known as outlier detection—to detect potential threats based on relative changes in behavior. Use cases, configuration guidance, and operational c
Bluemix: Simple cron-like service for my Python code
(Henrik Loeser) This morning I had some time to fiddle around with Bluemix and Python. I wanted to test out creating a cron-like service, i.e., something that runs in the background and kicks off tasks with given intervals or at a given time.
Updated DB2 11 & DB2 10 Diagnostics Guide and Reference are now
(Willie Favero) If you have a product license for DB2 11 for z/OS or DB2 10 for z/OS, it’s time to get your updated copy of the Diagnosis Guide and Reference.
Use Guardium outlier detection to detect hidden threats
(Kathryn Zeidenstein, Oded Sofer, Allon Adir and Rosa Miroshnikov) Learn how Guardium database monitoring is extended with enhanced security intelligence—known as outlier detection—to detect potential threats based on relative changes in behavior. Use cases, configuration guidance, and operational c
