DB2 Tech Talk: Solving Complex Data Warehousing Problems with InfoSphere
This in-depth technical webcast covers InfoSphere Warehouse Advanced Edition products. Listen to see how these products can help you quickly establish and run an enterprise-class data warehouse for your organization by reducing time and costs.
RecordedFeb 23 201272 mins
Your place is confirmed, we'll send you email reminders
In this session, we will review foundational cryptographic concepts and discuss the key highlights of the new DB2 native encryption capability, including encrypting online data, encryption backup images and key management.
dashDB is a newly announced data warehouse as a service deployed in the cloud that leverages technologies like BLU Acceleration, in-database analytics and Cloudant to allow you to focus more on the business and less on the business of IT. In this DB2 Tech Talk you will learn a little more about IBM’s cloud initiatives and the value proposition around dashDB as well as...
-dashDB’s architecture and use cases
-pricing and offerings as as service
-competitive differentiations and customer feedback
DB2's most recent release added significant new capabilities for both transaction and analytic processing. This presentation will take you through the new features and what you need to know. Attend this DB2 Tech Talk to learn about:
• BLU Shadow Tables
• Expanded Oracle SQL compatibility for data marts
• Enhanced SAP Business Warehouse support
• Standard TCP/IP sockets for pureScale
• Additional capabilities
In-memory, columnar, faster analytics, high availability and scalability. There is a lot happening in the data management space these days. In this presentation, we will go through some of the key capabilities in the newest release of DB2, including BLU Shadow Tables, standard TCP/IP sockets for pureScale, and other enhancements. We'll also talk through some of the latest competitive announcements and how DB2 stacks up to these offerings.
Soloman Barghouthi (presenter), Rick Swagerman (host)
In a 3 tier architecture, an application server is considered tier 2 and a database is considered tier 3. IBM offers a well known Composable, secure and high scalable application server called WebSphere Application Server. IBM also offers multiple databases one of which is is DB2. This session will explain some of the key integration features between the two products and why this combination helps you create a secure, scalable and highly reliable solution for your middleware and backend database. Topics covered in this session are:
-- Security: Trusted connection support
-- Scalability: Heterogenous pooling support and Lock sharing
-- Resiliency: Automatic client reroute and failover enhancements
-- and more
In this session from the IDUG 2014 Technical Conference in North America, Randy Ebersole highlights some of the new features of DB2 11. He introduces some of the new functionality to get you thinking about moving to DB2 11!
Guersad Kuecuek (presenter) and Rick Swagerman (host)
Analytics are the hot business need because the competitive advantage goes to the organization who is first to discover and capitalize on the business insight. Data is at the root of this, but it is the analytics that provide data value. For many years DB2 has been used with OLAP and OLTP systems by SAP customers worldwide to deliver a cost-effective database engine to SAP applications.
Now with DB2 10.5 with BLU Acceleration, you can use this next generation in-memory technology to deliver these insights from data fast and simply. DB2 with BLU Acceleration is an in-memory technology, which makes analytical jobs by factors faster right out of the box, while requiring dramatically less storage and nearly eliminating the need for tuning.
Although BLU Acceleration is in-memory optimized, it is not main memory-limited. DB2 BLU is highly optimized for accessing data in RAM, but performance won’t suffer as data size grows beyond RAM. These benefits are achieved through next generation columnar processing, operating on compressed data, carefully exploiting modern microprocessor designs, and accessing memory efficiently. The result is a system that simultaneously looks and feels like DB2 while being in-memory optimized, CPU-optimized and I/O-optimized.
SAP-DB2 customers have seen tremendous performance improvements with the same hardware. Because of this, customers can reuse their existing IT infrastructure and simply update to the newer DB2 10.5 version-- converting row-store tables to column-store tables.
Join DB2 - SAP expert Guersad Kuecuek for a discussion of the technical features of this solution including how to use BLU, how to derive performance improvement and how to do the sizing for BLU.
Judy Ruby-Brown gives a thorough overview of system level backup and using FlashCopy for disaster recovery as provided by various vendors. This presentation is quite thorough but yet very easy to understand, even for a beginner. Judy explains the types of services that need to be setup for disaster recovery as well as easy scenarios for the DBA in the implementation of disaster recovery. Just the summary at the end is enough to pass on to the system programmers in your shop as a checklist for implementation.
Jef Treece and Shawn Moe, IBM Labs; with Rick Swagerman (host)
The "Internet of Things" is the growing number of devices and sensors that communicate via the Internet, offering vast new opportunities. Harnessing data from billions of connected devices lies in the ability to store, access and query SQL and NoSQL data together, seamlessly. The result of all this data is the need for fast development of web and mobile applications and speed-of-thought insight for fast business decisions.
Learn how to use Informix and DB2 to bridge the gap between new computing technologies designed for big data, cloud, and mobile computing with the enterprise world of relational data in the "Internet of Things" era. Jef Treece and Shawn Moe will present how to develop mobile applications using techniques that preserve the native look and feel specific to such devices as Android and iOS. They will also show device-agnostic techniques and discuss new approaches to handling a range of types of mobile devices. A discussion of how to keep data on the device in sync with a back-end database or cloud service, such as DB2 or Informix on BlueMix will also be included. And finally, using an embedded database to achieve a truly scalable and reliable Internet of Things architecture will be included.
In this comprehensive overview of DB2 10 for z/OS Lori Ann Galluzzo goes through the features of DB2 10 in great detail. Each feature is discussed, along with how and when to take advantage of the feature, as well as some pitfalls and things to watch out for.
Les King, Kelly Schlamb, Vladimir Stojanovski (presenters) and Rick Swagerman (host)
Today in order to remain competitive, there is a tremendous demand on lines of business to be able to analyze more aspects of business data and do this very quickly. There is a control shift to the business analyst so they can analyze what they need to, NOW!
Big Data requirements are also emerging, even as everyone is being asked to accomplish more with less. Join us to learn how the combination of DB2 10.5 with BLU Acceleration and Cognos BI 10.2 can help bring sanity to satisfying these ever increasing demands.
We will provide an overview and technical deep dive of DB2 10.5 with BLU Acceleration, Cognos BI 10.2 and Dynamic Cubes. Join experts from the DB2 and the Cognos BI teams who will also explain how these two offerings fit together and the benefits they have provided to clients already. See the value that DB2 with BLU Acceleration can bring to Cognos BI, and ask these experts your questions, so you can understand how this solution helps solve business challenges.
Conference Chairman Bob Vargo gives attendees a detailed overview of the conference, seminars, keynotes, and the technical sessions that will be featured at this year's North American conference. Viewers are introduced to the schedule, speakers, and are given tips and insights into the conference.
Vladimir Stojanovski, Predictive & Business Intelligence Segment Leader
Watch a demonstration of IBM Cognos Business Intelligence running on a DB2 BLU Acceleration in-memory database.
The demo compares, side-by-side, the performance of a dashboard sitting on top of a traditional row-based data warehouse with indexes, versus a dashboard sitting on top of the same database, with BLU Acceleration.
BLU Acceleration is an innovation from IBM Research and Development labs that delivers a new generation of In-memory database technology, for "speed of thought" analytics. Coupled with Cognos Dynamic Cubes, it results in sub-second query result times. See it for yourself!
SQL is a powerful language that you will learn to use to a greater extent in this talk! Join us to explore some of the less well-known features of SQL and see how they can help in some practical situations. We will also look at some common mistakes and misconceptions and discuss ways of avoiding them. Among the topics:
- tricks with date and time values
- use of common table expression and recursive queries
- use of data change tables
- use of nested tables
- use of the MERGE statement
- and more.
Nick Ivanov is presenting this talk based on his consulting experience with many customers to maximize use of IBM DB2 and other products; move applications to DB2; and tune database and query performance.
Although the DBA’s tuning efforts often result in both a decrease of CPU consumption and end user response times, the perception of DBA activities at the C-level sometimes is more of the kind “why didn't they do that before?”.
This presentation helps you to better understand the C-level perspective and shows you how we managed to improve the image of the DBA team from a reactive team of techies to a proactive team that is directly involved in improving the business results.
Sriram Padmanabhan (presenter) and Rick Swagerman (host)
IBM InfoSphere Information Server is a market-leading data integration and governance platform. It provides a set of capabilities to build confidence in your data by helping you understand, cleanse, transform and deliver trusted information to critical business initiatives, such as big data, master data management and point-of-impact analytics. Information Server provides comprehensive connectivity to DB2 (including DPF and BLU Acceleration) and it can also push computation to DB2 when appropriate. By using Information Server with DB2, you get its best-of-breed capabilities to integrate DB2 data and manage its metadata as well.
Join us for this DB2 Tech Talk to learn how using these products together can help you deliver trusted information to your business, support big data initiatives, and more.
In March 2013 the IDUG DB2 11 Editorial Committee was formed, comprised of volunteers from IDUG’s worldwide community of DB2 users and consultants. Working alongside IBM's formal Early Support Program (ESP), the Editorial Committee gained valuable insight into exactly what makes the new release tick. The White Paper, available on the IDUG web site, contains their findings, including practical experiences and independent evaluations of the new features.
DB2 11 contains a large number of enhancements, but some will be of more interest than others depending on your job role and background. The paper has been organized according to the features likely to be most applicable to each of the three major technical roles in a DB2 for z/OS environment: Systems Programmers, Database Administrators and Application Developers.
This presentation from the IDUG EMEA 2013 Technical Conference looks at some of the key findings presented in the paper.
IBM InfoSphere Optim Workload Replay can significantly improve your database testing experience and help you successfully manage change in your database environments, whether you are adopting BLU Acceleration, upgrading DB2, or making the move to DB2. Using InfoSphere Workload Replay, you can build realistic testing environments to help assess a wide range of database changes before production deployment and without extensive script creation or application setup. This makes the change process faster and less risky.
In this session, we will examine the use of InfoSphere Workload Replay to facilitate database testing in efforts to validate version, platform or infrastructure changes. We will discuss how to use the tool to prepare for BLU Acceleration, and review some of the key use cases. Learn the testing methodology and the various features to control capture, replay and generate reports. Using this realistic testing approach you will find key issues sooner in the test cycle, and resolve them before the deployment day.
Anson Kokkat (presenter), Tony Leung (presenter), Rick Swagerman (host)
Stored Procedures and user-defined functions are a great way to consolidate database logic, improve database performance, code re-use, security and integrity. Stored Procedure development in DB2 has always been an integral part of the database, and in this DB2 Tech Talk, we will look at how IBM Data Studio helps accelerate the development and debugging process.
IBM Data Studio is a comprehensive database development and administration environment. It includes the tools needed to develop and deploy Stored Procedures. We will look at the various wizards and options available to create a SQL Stored Procedure and walk through the debugging of that stored procedure in a DB2 environment.
Joint DB2 Tech Talk series sponsored by IDUG with IBM
This one-stop webcast channel makes it fast and easy to build and extend your technical skills on the IBM DB2 product family. IDUG has joined forces with IBM to bring together a wide array of learning sessions on technical product features, related products, new product developments and more.
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.
Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.
And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:
- What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
- How your cloud vendor can support you
- What questions auditors typically ask
- How all this impacts your disaster recovery plans as well as your public cloud use
The Internet of Things (IoT) is already a huge deal and it's only going to get bigger
There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.
That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.
Join this webcast to learn how to:
•Conceptualize why you might need a cloud-based hub solution
•Easily set up an IoT Hub in Azure
•Create simulated devices and communicate to your hub
Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.
Join this webcast to learn how integrated PPM solutions:
•Bring increased accountability across agency projects
•Facilitate real-time collaboration between project and program managers and their teams
•Reduce redundancy and manual effort
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.
Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.
Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.
At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
There has always been change in our profession. We originally started by implementing disaster recovery programmes. Soon after that, the businesses realized that the people aspect of recovery was needed as well. The results were the beginning of business continuity programmes. DR and BC have worked together almost two decades now with great success. We are now at a major transformation point again. Business continuity is now sharing more information and interacting more with security and compliance groups.
This session will go over what most of us already have in place, what we will need to add, and how all three groups interface together to provide a new resilience program for your environment. The goal of this session is to show the interactions between risk management, business continuity, security and compliance that form the components of a resilience programme.
58% experienced issues when failing over IT systems! - The State of IT Disaster Recovery in the UK – 2016 Survey
Find out if you’re ahead or behind on IT Disaster Recovery. In a survey commissioned by iland and conducted by Opinion Matters, 250 IT decision makers in the UK were asked about their DR experiences, challenges and strategies. And, we’re sharing the results!
Learn from your peers:
- The frequency of DR testing – how much is enough?
- The impact of IT outages – how disruptive would it be to your business?
- The trade-offs IT leaders make between downtime, cost and security – what trade-offs make sense for you?
Join iland and Zerto as we dig into the survey findings which will be a useful benchmark for your own DR strategies. Don’t miss it.
Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?
Aujourd’hui, les responsables sécurité sont confrontés à :
•un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
•une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
•peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT
Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.