I still remember this meeting when I had been a DBA for less than a year at IBM. It was IBM, so I was the lone primary DBA for this internal client. With 3 whole months of experience and a shiny college degree.… Read the restContinue reading »
What is Db2? This article is one of my few that is not directed at a Db2 DBA or someone trying to fill some of the roles of a Db2 DBA. This is directed, as much as I can manage, at any technologist trying to understand what Db2 is and the role it plays in an IT organization.… Read the restContinue reading »
Once IBM made the Request For Enhancement (RFE) program workable last year, I blogged about it and tweeted about it, but now that we’ve seen more action on it, I thought I’d share some additional details.
What is an RFE?
First off, an RFE is a request for some feature or functionality in Db2 that does not exist today.… Read the restContinue reading »
This is the third time I have written this post. It keeps changing, so I keep sharing.
I work from home, so downloading software to my laptop and then uploading it to a server is not very efficient. Download speeds aren’t bad, but uploading can take 8 hours or more, depending on the client.… Read the restContinue reading »
Edit: 01/23/2018 – corrected one word not in an SQL statement.
I have written several other articles on security and permissions, but I thought I would write one from a purely practical perspective. If you don’t understand the basics of how DB2 handles users, authentication, authorization, and privileges, please read Db2 Basics: Users, Authentication, and Authorization.… Read the restContinue reading »
Why Should a Database be Highly Available?
It is significantly easier to implement high availability at other levels than it is at the database level. Often the database server is one of the more powerful servers in an environment, and without some fancy footwork there can be only one live copy of data.… Read the restContinue reading »
Edited 12/13/2017 to correct image and details about the database heap.
Db2 memory management is a complex topic that I’ve already written about from several perspectives, and have a few blog entries in mind to explore further. A presentation that Melanie Stopfer gave a while back really helped me understand STMM better.… Read the restContinue reading »
I often lean on analogies when I speak to non-technical people about technical topics. For example, I would explain database locking as “two kids fighting for the same candy bar”. If you introduce isolation levels into the conversation, I would expand the analogy to include “one sibling holding on to a candy bar they care nothing about just because they don’t want the other sibling getting to it”.… Read the restContinue reading »
Recently I was forced outside my comfort zone and asked to vet various open source BI tools. I was a report developer in a past life, a database administrator supporting datamarts at various employers, and even supported Cognos backend databases. I thought my past experience gave me an edge when it came to evaluating BI tools.… Read the restContinue reading »
HADR does an awesome job of replicating all logged operations to 1-3 standby databases. It is remarkably simple to use and pretty resilient. More than once I’ve started talking to a client about PureScale only to discover their actual high availability and/or disaster recovery needs can easily be met by a 4-server HADR implementation.… Read the restContinue reading »