As I started Part 3 of this DB2 Family Security Best Practices blog, I was notified that my personal information was hacked again. That is five different times my information has been taken. So I offer this third installment on database security that will hopefully help every company secure their data.
I have quickly realized . . . → Read More: More DB2 Family Security Best Practices Part 3
Below is Part 2 of the Top 10 DB2 Family Security Best Practices. All the DB2 security-minded DBAs and system administrators should verify their DB2 security configuration along with their DB2 security authority definitions as soon as possible. The first five parts of the Top 10 DB2 Family Security Best Practices that I talked . . . → Read More: Top 10 DB2 Family Security Best Practices Part 2
The DB2 database family leads the industry with some of the best security features, safeguards, and mechanisms to secure your data. Security breaches of any database trouble us all, so it is always good to review the best security practices available. Below are a list of the top ten that all DB2 DBAs should verify . . . → Read More: Top 10 DB2 Family Security Best Practices Part 1
Years ago, before I started my career or gave my speech at the first IDUG conference, many declared the mainframe dead. When I was going to college, the uninformed were saying the mainframe was old technology. The new z13 mainframe is not old, IBM just continues to improve it with proven technology and the fastest . . . → Read More: IDUG Report: DB2 and Mainframe Continue Strong Performance
Since Java is the new main development language for most companies it is vital that all the programmers know the best DB2 Java performance properties and considerations. During system and application Java performance reviews there are many factors that come up that impact performance. Below are several Java DB2 SQL performance factors that can have . . . → Read More: Vital Java DB2 SQL Performance Considerations
With the all the hacking stories getting a lot of news coverage, security of your DB2 system is paramount. Doing a DB2 SQL security audit periodically or before your DB2 migration has been a standard security best practice of many for countless years and many DB2 Version upgrades. These DB2 SQL security audits help eliminate . . . → Read More: DB2 SQL Security Audits
With the all the hacking stories getting a lot of news coverage, security of a company’s information will definitely be on everyone’s mind. There are many DB2 security options and features that can be used within the system, database, and application environments. As I have written before, DB2 security for row and column access . . . → Read More: DB2 Security Definitions
As some plan their vacations this year, others are planning their DB2 11 migrations. If you’re in the second category, begin by reading the DB2 migration documentation, and then look at the ten extra items below. These ten items might just help you avoid any issues or problems.
Get on the latest cross-system IBM maintenance. . . . → Read More: DB2 11 Migration Preparation
On January 13th IBM unveiled its new mainframe, the z/13. IBM mainframe System z’s world-leading reliability, availability, and scalability, coupled with its security and virtualization capabilities are needed more than ever as mobile applications take over as the most prominent and important corporate workload. Today’s corporations are embracing mobile workloads that grow at a much . . . → Read More: z/13 IBM’s New Mainframe Built for the Mobile, Cloud and Analytic Future
‘Tis the holiday season, and I want to thank all my readers for their comments and encouragement. It has been a pleasure and honor working/hearing from all of you. I enjoy the challenges of data management too much, and my curious nature has me continuing to explore and write about all its aspects. Data management . . . → Read More: Five Data Management Trends for 2015