This article describes how the Db2 optimizer is evolving into the next generation Db2 AI optimizer. Query optimizers have evolved from a heuristic...
Read PostIDUG News & Blogs
Learn with IDUG – Member created content for Db2 Professionals
Check back here frequently for our curated content – technical articles, IDUG news, and thoughts from our leadership, all posted here, and featured monthly in the IDUG eBulletin.
Interested in contributing an article for consideration? Contact our Content Committee!
You are preparing to leave Friday afternoon, maybe a little early to beat traffic to the cottage. You do one last health check on your cluster, and...
Read PostCan Db2 for z/OS be configured to be secure and compliant? Yes. Db2 can be configured to be secure and compliant by leveraging the various security...
Read PostLogical Schema Backup and Restore for Columnar Tables: Part 2 – Troubleshooting Logical Backup and Restore operations This article is Part 2 of a...
Read PostCan Db2 be hacked? Yes, sure it can. This answer could conclude the article, but as always, there is more. Yes, Db2 can be hacked, but if not...
Read PostEncryption of “Data on the Wire” with TLS (Tranport Layer Security), formerly known as SSL, is more and more mandatory, also in the Db2 for LUW and...
Read PostIn Chapter 2 of this series, Gerry addressed the following frequently asked question, "Can I make custom configuration changes to the Db2 Pacemaker...
Read PostBefore you migrate to any new Db2 release such as Db2 13 you usually do a migration readiness planning. Part of this planning is running the...
Read PostI joined IBM shortly after I graduated from the University of North Texas back in 2019. I was full of excitement and eager to embark on my first...
Read PostIn the last year a bit of a revolution has emerged in the Business Intelligence (BI) space, with the introduction of watsonx.data, IBM’s newest data...
Read Post