Últimas publicaciones en los blogs

DB2TOP register and replay

Actually DB2TOP is a real-time tool, however many DBA’s don’t know that it can be run in REPLAY mode with captured session information. So, next time you have a big crisis with your database, you can capture all the data from db2top and do the analysis afterwards.

How to capture the data? Option -C to capture. Press N to create a file. The option “-m” to gather data during n minutes.

Options db2 command line – Disable autocommit

DB2 command line utility has different options. In this post we show how to disable the autocommit of DML statements that by default is active. In case you want to do some test, for example, simulating the use of locks could be helpful to disable this feature.

Options from DB2 command line can be obtained with the following sentences:

DB2 Top 10 SQL for execution time

SQL Command to obtain the Top Ten of SELECT SQL sentences with more execution time in your DB2 database:

db2 "SELECT AVERAGE_EXECUTION_TIME_S as TIME_SECONDS, NUM_EXECUTIONS as

EXECUTIONS, STMT_TEXT as TEXT FROM SYSIBMADM.TOP_DYNAMIC_SQL WHERE

upper(STMT_TEXT) like 'SELECT%' ORDER BY AVERAGE_EXECUTION_TIME_S DESC FETCH

 

DB2 with BLU Acceleration for SAP

Every time it’s more common SAP environments running with DB2.

Attached a video regarding the capabilities of DB2 with BLU Acceleration applied to SAP and all SAP notes to consider.

Surprising comparative with SAP HANA, and as with less complexity and investment, you get more performance.

Pay attention to the comparison with SAP HANA:

Attached also the IBM Redbook Architecting and Deploying DB2 with BLU Acceleration.

 

How to Protect Your Data in 2019

The number and variety of threats to your business and personal data are always increasing. In 2019, attackers have become so sophisticated that it can be a struggle to stay ahead of them. As many as a third of organizations cannot protect their data from cybersecurity threats.
Read on to learn about some of the common data security threats, as well as a number of tools and practices that can help you protect your data in the event of a breach..

5 Things to Know About the PCI Software Security Framework in 2019

Everyone sells something online, nowadays. Through social media networks, people sell a digital image of themselves to the world. While this image doesn’t often directly translates into money, it can translate into career advancement—through LinkedIn—or brand awareness—through Facebook pages..

Best Practices for Your Data Loss Prevention Policy

Data Loss Prevention (DLP) is the practice of implementing policies and tools for the purpose of protecting business information against data exfiltration, data breaches, and data corruption. A DLP policy defines the process, while a DLP solution implements some or all aspects of the policy..

Top 7 Tips for an Effective Cloud Migration Strategy

Businesses are increasingly moving to cloud platforms to stay competitive, reduce operational liabilities, and take advantage of advancing technologies. Cloud platforms can provide flexible solutions to a variety of organizational needs provided you consider their benefits and risks carefully..

Everything you need to know about Amazon EBS

If you’re looking for a user-friendly and cloud-based block storage system, Amazon EBS is the right solution for you. The system integrates with the entire AWS platform, and you’ll be able to use built-in Amazon security, backup and access control features. EBS provides you with four types of volumes for SSD-backed volumes and HDD-backed volumes..