Learn from Everyone’s Sessions at IDUG

Another IDUG conference is coming up, and the agenda of presentations looks great.  The IDUG conference planning Committee always does a great job, and the agenda shows many extra educational sessions.

This year’s IDUG conference addresses the latest DB2 releases and business issues with many great presentations for application developers, DBAs, and managers wanting to learn the latest techniques for solving the tough business issues.  There are some great sessions talking about DB2 for z/OS and the new Version 12, the new DB2 for LUW Version 11 , IDAA Analytics, DB2 Cloud, and Spark.

I’m also looking forward to seeing old friends and making new ones.  Like me, some friends have been attending and presenting at IDUG for many years, and their IDUG sessions help provide in-depth business and technology perspectives.

Hope to see you at IDUG next week and at one of sessions or panel discussions.

  • “How to do a DB2 Security Audit”
    o    Tuesday 2:15-4:30 PM Room:  Frio

This half-day seminar details the DB2 z/OS and DB2 LUW security best practices. It discusses the current state of systems, database tables, and how best to protect your PII data from hackers. The seminar also discusses the hardware and software technology options along with encryption, stenography, and security audit reports that can quickly identify security issues.

The student will learn design, system settings, application development practices and authorization procedure techniques that they can implement at their company to safeguard their systems and protect their data. These DB2 z/OS and DB2 LUW best practices are vital for anyone who is serious about protecting their PII data.

  • “Performance Enterprise Architectures for Analytic Design Patterns “
    o    Wednesday, May 25th 1:00 – 02:00 PM – Room: Pecos

With today’s cloud, application appliance, and columnar database alternatives, implementing another analytic data silo is quickly and easily done.  Architecting enterprise analytical systems requires comprehensive data management and usage analysis to build the proper performance infrastructure design pattern.

Having designed, deployed and implemented successful 5-billion, 8-billion, and 22-billion row analytical database systems, I will discuss the design patterns that provide sustainable performance for fast analytic answers.  Through this presentation you will learn the enterprise analytics architectures, special design patterns, and techniques required to maximize performance for fast analytic answers.

  • “DB2 Security Best Practices: Protecting your system from the Legions of Doom”
    o    Thursday  8:00-9:00AM Room: – Trinity A

As the Legions of Doom descend on your system, you need to be prepared with the best security techniques and strongest configuration safe guarding your data. This presentation discusses the latest DB2 security techniques, software configurations, and best practices for a resilient comprehensive DB2 security strategy.

The presentation discusses how to design, configure, and implement a multi-layered DB2 security perimeter around data. By having many layers of DB2 security defenses, there will be several different security software components helping stop any nasty legion bandits from getting your data. Through proper DB2 security techniques given in this presentation, you will learn the secrets to defeating the Legions of Doom.

For more details on any of these items go to www.idug.org.


Dave Beulke is a system strategist, application architect, and performance expert specializing in Big Data, data warehouses, and high performance internet business solutions.  He is an IBM Gold Consultant, Information Champion, President of DAMA-NCR, former President of International DB2 User Group, and frequent speaker at national and international conferences. His architectures, designs, and performance tuning techniques help organization better leverage their information assets, saving millions in processing costs.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>