by Ember Crooks | Nov 19, 2020 | Featured
I thought I’d share an overview of the real-time monitoring options for Db2 (LUW). This article focuses on comparing the options, with links to deeper information on each tool. Types of Monitoring First a quick overview of the types of monitoring that every DBA...
by Ember Crooks | Nov 10, 2020 | Featured
When I first started learning about data science, the amount of material out there was daunting. It is hard to find your way in what you should learn and how you should learn. I thought I’d share what has been working for me and what didn’t.… Read...
by Ember Crooks | Jul 22, 2020 | Featured
One topic that comes up at most panels, Technical Advisory Board meetings and other longer interactions I participate with for IBM is DBA’s love of db2top. It is such an easy tool, and one that most DBAs I know choose over all others for real-time monitoring and...
by Ember Crooks | Jul 21, 2020 | Featured
The IDUG Virtual conference kicked off today, and I thought I’d share my excitement and a few observations. Content Today Today was mostly the opening keynote and the spotlight sessions. Recordings of Monday’s sessions will be available on-demand for...
by Ember Crooks | Jul 17, 2020 | Featured
If you’ve read the blog for a while, you realize I’m a big fan of the IDUG conferences. I’ve gone to the North American one every year for the better part of a decade now, and the European one for several years.… Read the rest
by Ember Crooks | Jul 14, 2020 | DB2, Featured, ldap, security
Db2 is a bit unusual among RDBMSes in that it does not perform authentication. No matter what, you need some external authority to perform authentication. Usually that is either the OS or LDAP, though there are other options. If using LDAP, either transparent LDAP or...
Recent Comments