(Peter Hartmann) Sometimes it is useful to generate JCL executable code for //SYSIN via SQL mass operations, e.g. change specific tables from one option to another.
(Adrian Burke and Paul McWilliams) In Db2 for z/OS you can use the profile monitoring capability to monitor or limit resource consumption by distributed database facility (DDF) workloads.
(Craig Mullins) Why have agile development and DevOps techniques been adopted for software development over long-standing techniques like the waterfall approach?
(Martin) EVERYBODY (100%) in our audience learned something! Roy described the impact of limits on Db2 processing and their effect on Db2 processing.
(Alex Woodie) Much of the Western World may take August off, but apparently not hackers and other off-book computer enthusiasts, as IBM addressed several security problems across its IBM i software family last month.
(Martin) 100% of our studio audience learned something!Greg presented a thorough introduction to using TLS with Db2 LUW 11.5.
(Craig S. Mullins) Data privacy regulations and the desire to protect sensitive data requires methods to mask production data for test purposes.
(Julia Carter) When I was much younger, even more naïve and less cynical than I am now, I was amazed by one of my colleagues who created some ISPF panels with some REXX and Cobol behind them to automate the process to accomplish one of our common DBA tasks.
(Frank Enders and Sergey Kubin) A cheat sheet approach to creating Data Reduction Pools.
(Guillaume Arnould) Customers are not as loyal as they used to be. As a customer, if you don‘t get the experience you are looking for, you look for alternatives.