Five Data Management Predictions for 2018

Happy New Year! I hope everyone has their 2018 filled with good health, happiness and prosperity. Once again I am offering you my data management predictions for 2018. Thank you all for great support in 2017 and countless emails regarding my conference, user group presentations and blogs last year.

For 2018, I will continue to . . . → Read More: Five Data Management Predictions for 2018

5 Ways to Save Millions When Migrating from Oracle to Db2

Working with a large number of consulting customers brings many different corporate attitudes, database platforms, innovative ideas, styles of database utilization and cost structures for database operations. Software licensing, support and application development costs often lead into strategic discussions of ways to save millions. IBM is helping companies save millions of dollars by migrating their . . . → Read More: 5 Ways to Save Millions When Migrating from Oracle to Db2

DB2 LUW Security: More Ways to Secure your System

Over the years, I have developed many of my security practices and used many of the government security guidelines to perform security audits in client environments. The combination of the government guidelines and my experience helps me uncover and secure the desired client’s systems and applications against ever-changing hacker attack points. One of the resources . . . → Read More: DB2 LUW Security: More Ways to Secure your System

Five Ways to Make your DB2 Data Delicious for Application Development

Recently on the REDDIT DB2 forum someone raised a question (found here) about DB2’s future in application development. The question and answers talked about the database industry and the reason DB2 is positioned in the upper right quadrant in the latest Gartner Magic Quadrants found here.

To address some of those concerns, here . . . → Read More: Five Ways to Make your DB2 Data Delicious

International DB2 Users Group (IDUG) Trip Report - Dave Beulke

Here is my trip report from the annual International DB2 User Group (IDUG) conference held last week. The event was great because of the technical, real world, pragmatic, and easy-to-understand content, especially from the user speakers. The IBMers, consultants, and vendors also provided great material to help make everyone’s DB2 systems and applications perform better . . . → Read More: IDUG DB2 Trip Report

DB2 Install Next Steps: Part 1

Tuning DB2 LUW systems, databases, and applications can be sometimes a long drawn out research effort requiring examination of every variable involved. Sometimes the key to the performance is examining the DB2 LUW system installation, its configuration, and the database configuration. This why I call this blog “DB2 Install Next Steps” because if the SYSADMIN . . . → Read More: DB2 Install Next Steps: Part 1

More DB2 Family Security Best Practices Part 5

The next part of this DB2 Family Security Best Practices blog series talks about developing a unique corporate security. This security is unique within your organization and unique within your applications.

Given that encryption can have performance overhead, can complicate management procedures, and require application changes, sometime it’s not an option. So another DB2 security . . . → Read More: More DB2 Family Security Best Practices Part 5

More DB2 Family Security Best Practices Part 4

The next part (Part 4) of this DB2 Family Security Best Practices blog talks about the many aspects and issues around DB2 LUW and DB2 z/OS encryption. Encryption needs to be discussed extensively with your security department and various applications because it has long term impacts on operations, maintenance, and applications.

First, DB2 encryption protects . . . → Read More: More DB2 Family Security Best Practices Part 4

More DB2 Family Security Best Practices Part 3

As I started Part 3 of this DB2 Family Security Best Practices blog, I was notified that my personal information was hacked again. That is five different times my information has been taken. So I offer this third installment on database security that will hopefully help every company secure their data.

I have quickly realized . . . → Read More: More DB2 Family Security Best Practices Part 3

Top 10 DB2 Family Security Best Practices Part 2

Below is Part 2 of the Top 10 DB2 Family Security Best Practices. All the DB2 security-minded DBAs and system administrators should verify their DB2 security configuration along with their DB2 security authority definitions as soon as possible. The first five parts of the Top 10 DB2 Family Security Best Practices that I talked . . . → Read More: Top 10 DB2 Family Security Best Practices Part 2