| 09:30 – 10:30am | Denis Tronin, Broadcom Mastering Access Path Management in Db2 for z/OS: Simplify, Optimize, Succeed |
| 10:30 – 10:45am | Break |
| 10:45 – 11:45am | Chris Crone, Broadcom Strategies for Making Db2 Data Accessible with APIs |
Mastering Access Path Management in Db2 for z/OS: Simplify, Optimize, Succeed
Download PDF
Watch recording (logged in Tridex members only)
Session title: Mastering Access Path Management in Db2 for z/OS: Simplify, Optimize, Succeed
Session abstract: The access path chosen by Db2 has a major impact on SQL performance and overall application efficiency. This session offers a quick refresher on access path fundamentals and focuses on best practices for managing access paths across the application lifecycle to ensure stable workload performance.
Continue reading “Mastering Access Path Management in Db2 for z/OS: Simplify, Optimize, Succeed”Strategies for Making Db2 Data Accessible with APIs
Download PDF
Watch recording (logged in Tridex members only)
Session title: Strategies for Making Db2 Data Accessible with APIs
Session abstract: This session will explore multiple strategies for enabling API access to your Db2 data. We will examine both direct API connections to Db2 and alternative mechanisms for accessing Db2 data through z/OS-enabled APIs.
Continue reading “Strategies for Making Db2 Data Accessible with APIs”Tridex Db2 z/OS – November 13th 2025 agenda
| 09:00 – 10:45am | Anthony Ciabattoni, IBM Db2 for z/OS Development end of year 2025 Swat Tales Extended Version |
| 10:45 – 11:00am | Break |
| 11:00 – 12:00am | Anthony Ciabattoni, IBM Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience |
Db2 for z/OS Development end of year 2025 Swat Tales Extended Version
Watch recording (logged in Tridex members only)
Session title: Db2 for z/OS Development end of year 2025 Swat Tales Extended Version
Session abstract: The session will concentrate on new SWAT team experiences. Various unexpected outcomes and behaviors will be discussed as well has how technical items customers are exploiting along with technologies that have been challenging for customers.
Continue reading “Db2 for z/OS Development end of year 2025 Swat Tales Extended Version”Db2 for z/OS Development end of year 2025 Swat Tales Extended Version
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Db2 for z/OS Development end of year 2025 Swat Tales Extended Version”Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience
Watch recording (logged in Tridex members only)
Session title: Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience
Session abstract: In today’s digital landscape, cyber resilience isn’t optional — it’s essential. This session will concentrate on a consistent repeatable Cyber Recovery process that significantly improves Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO)
Continue reading “Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience”Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Strengthen Your Cyber IBM Z and Db2 for z/OS Resilience”Tridex Db2 z/OS – September 25th 2025 agenda
| 09:30 – 10:30am | Ulf Heinrich – SEGUS Inc Exploit Certificates and eliminate tiresome password-pains in z/OS and USS |
| 10:30 – 10:45am | Break |
| 10:45 – 11:45am | Roy Boxwell – SEGUS Inc Isn’t she aDORAble? A DBAs guide to DORA, PCI DSS V4.0.1 and how to survive an audit! |
Exploit Certificates and eliminate tiresome password-pains in z/OS and USS
Watch recording (logged in Tridex members only)
Session title: Exploit Certificates and eliminate tiresome password-pains in z/OS and USS
Session abstract: Certificates are a key technology these days for authentication, authorization and encryption. If you joined last year’s presentation “Understand, manage and love Certificates in z/OS and USS” you already know how certificates are used in z/OS and USS for secure connections. This presentation will start with a brief recap and I’ll introduce best practices for certificate lifecycle management.
Continue reading “Exploit Certificates and eliminate tiresome password-pains in z/OS and USS”