Últimas publicaciones en los blogs

Tuning DB2: Snapshots

To tune a database is useful to create snapshots that capture information from different structures/components of the instance.

In this post we show how they can be used to perform an analysis of tuning.

First of all, the monitor switches must be on to collect data from the different structures.

The state monitors are available as follows:

How to Secure Your Open-Source Components

A 2019 survey by Synopsys found that 96% out of 1100 scanned codebases included open-source components. These open-source components come with some unique issues that could be putting your system at risk. This is particularly true if you’re unaware of their presence.

In this article, you’ll learn some considerations for using open-source components. You’ll also learn how to secure your components and minimize your risks..

Endpoint Threats: Vulnerabilities to Eliminate

Digital information is arguably the most important asset for modern businesses, from financial data to customer demographics. The potential loss of customer or business data carries too heavy a risk to ignore, from regulatory fines to loss of brand trust and customers.

Despite the risks, businesses are using an increasing number of network-connected devices, many of which are not centrally managed or protected. Such devices grant attackers more potential routes into a system and create more points for businesses to protect..

DB2TOP register and replay

Actually DB2TOP is a real-time tool, however many DBA’s don’t know that it can be run in REPLAY mode with captured session information. So, next time you have a big crisis with your database, you can capture all the data from db2top and do the analysis afterwards.

How to capture the data? Option -C to capture. Press N to create a file. The option “-m” to gather data during n minutes.