10:00am – 11:00am | Calisto Zuzarte, IBM Db2 AI Query Optimizer and Query Tuning |
11:00am – 12:00pm | Michael Roecken, IBM Db2 Availability & Recovery: Get Ready For What’s Next |
Db2 AI Query Optimizer and Query Tuning
Watch recording (logged in Tridex members only)
Session title: Db2 AI Query Optimizer and Query Tuning
Session abstract: This session looks at the latest advancements in the AI Query Optimizer from what is available in production to upcoming changes in the upcoming mod packs in Db2 v12.1.
Continue reading “Db2 AI Query Optimizer and Query Tuning”Db2 AI Query Optimizer and Query Tuning
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Db2 AI Query Optimizer and Query Tuning”Db2 Availability & Recovery: Get Ready For What’s Next
Download PDF
Watch recording (logged in Tridex members only)
Session title: Db2 Availability & Recovery: Get Ready For What’s Next
Session abstract: In the ever-evolving landscape of database management, ensuring the availability and swift recovery of critical data has become paramount.
Continue reading “Db2 Availability & Recovery: Get Ready For What’s Next”Db2 Availability & Recovery: Get Ready For What’s Next
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Db2 Availability & Recovery: Get Ready For What’s Next”Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines”Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS”