(Adrian Burke) Over the years as Db2 has traded real storage exploitation for CPU and zIIP MIPS reductions, customers have become more aggressive at utilizing these techniques.
(Henrik Loeser) Earlier this year, I wrote about how to use an API key or access token to connect to Db2 (on Cloud). Today, I am going to show you how to set up a service ID (technical user) on IBM Cloud, assign it a Db2 user ID (see screenshot) and grant database privileges.
(Ted Holt) One thing I have learned over the years is that no matter how much technology changes, people always ask the same questions like: “Why does the computer say we have 50 widgets when we only have 45?” and “Can you tell me who changed the due date of order number 12345?” and “How do sales of
(Jonathan Johnson) A short definition of the internet of things (IoT) is a collection of small devices connected to the internet. The IoT takes the concept “internet” a step further, beyond most people’s use cases.
(Craig S. Mullins) Today we begin a multi-part series of blog posts taking a look at what is involved in making database changes in a Db2 for z/OS environment.
(Rose Sakach) Do you want to learn more about the Zowe CLI and the IBM Db2 Database Plugin for Zowe CLI?
(Francesco Anderloni, Matthew DiVito, Bert Dufrasne, Roger Eriksson, Christopher Moore, Markus Oscheka, Duncan Simpson, Stephen Solewin) Companies need to migrate data not only when technology needs to be replaced, but also for consolidation, load balancing, and disaster recovery (DR).
(Henrik Loeser) In my previous blog post, I showed how you can easily encode and upload credentials to IBM Cloud Key Protect. Today, I am going to share sample code with you for retrieving the credentials and turning them back into a JSON object.
(Craig S. Mullins) This post is about the IBM Db2 Analytics Accelerator, sometimes (and hereinafter) referred to as IDAA.
(Rafael Victoria-Pereira) In the previous TechTip, I (very briefly) introduced Persistent Storage Modules and explained the differences between stored procedures (SPs), user-defined functions (UDFs), and triggers.