November 2016

Trusted Context and Roles – How are you serving up your security?

Practical approaches to how to utilize these DB2 constructs to manage access and ownership of your objects and data. Using ROLE's to own and manage your objects and data can remove auth IDs and groups from the security picture. Useful information allowing you to verify whether you’re environment is as secure as you think it is!
Objective 1: Introduce and define the concepts of Trusted Context and Role
Objective 2: Illustrate how to utilize Role - WITH ROLE AS OBJECT OWNER--AND QUALIFIER

Everything a DB2 for z/OS Application Developer Needs to Know About the DB2 Engine in 3.6 Milliseconds

In today’s world, DB2 for z/OS application requirements have become more complex than ever. This presentation is intended to provide the DB2 for z/OS processing fundamentals to the application developer. By increasing the developer’s awareness of how DB2 handles workloads, efficiencies will be realized. Areas such as index access, SQL processing, stored procedures and additional topics will be discussed.

DB2 for z/OS V12 Early View


Subscribe to RSS - November 2016