(Craig S. Mullins) Did you know that the order in which you code your predicates can have an impact on query performance? It is usually a minimal impact, but it may buy you a couple of microseconds for a very performance-critical query.
Tag: IBM
How to protect DB2 against External Attack
(Jack Vamvas) Fully protecting DB2 against an external attack requires solid design and regular Audits. Exposing some surface area to external connections ,creates an attack opportunity. As a DBA being aware of potential weaknesses and designing secure systems is a top priority.
Why don’t you blog that often anymore
(Willie Favero) Good question and one that is both difficult and easy to answer. Let me explain.
db2audit & syslog: Who Stole my Chocolate Easter Eggs?
(Henrik Loeser) Easter is coming up, a slow day due to vacation and Spring Break, time to try out some, in advance, of the chocolate Easter eggs. Gosh! They are gone! Who took them? It must have been someone with insight. Let’s take a look at the audit logs…
I encrypted my database! How do I manage my master keys now?
(Mihai Iacob, Amyris Rada, Geoffrey Ng, Greg Stager, Hamdi Roumani and Walid Rjaibi) After your database is encrypted with DB2 native encryption, learn to manage your master keys to ensure that they are secured and protected. DB2 native encryption is available through the DB2 Encryption Offering as
Practical SQL: DB2 at Home, Part 4, Making XML Data
(Joe Pluta) The previous “Practical SQL”articles have followed a theme of accessing your XML data in a relational way. Every article led us a little further down that path, and future articles will continue to do so.
SQL Performance Basics: Part 3, Eliminating Predicates?
(Craig S. Mullins) It is technically possible to learn how to write SQL statements without having an in-depth knowledge of the data. However, the better you know your data, the better your application performance will be. Let’s look at a simple example.
Developing a plug-in connector for web service endpoints using WebSphere Cast Iron: Part 1: Generating artifacts using the CDK wizard
(Raghvendra Neelekani) This five-part tutorial series shows you how to use the WebSphere Cast Iron Connector Development Kit (CDK) to quickly and easily develop plug-in connectors for web service and ReST based applications. Part 1 covers design considerations when developing a plug-in connector, an
The Coming pureScale Invasion
(Ian Bjorhovde) I’ve thought for a long time that one of the biggest issues that IBM has faced in getting more traction with pureScale is that it’s only included in the Advanced editions of DB2 – Advanced Workgroup Server Edition and Advanced Enterprise Server Edition. The recent announcement of the
The DB2-Managed Data Archiving Feature of DB2 11 for z/OS
(Robert Catterall) Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS.
