“Run-It-Back” – Db2 for z/OS Development all new “2024 Swat Tales”

Download PDF

Watch recording (logged in Tridex members only)

Session title: “Run-It-Back” – Db2 for z/OS Development all new “2024 Swat Tales”

Session abstract: The session will concentrate on new SWAT team experiences. Various unexpected outcomes and behaviors will be discussed as well has how technical items customers are exploiting along with technologies that have been challenging for customers. The complete session will be focused on customer experiences and sharing real life outcomes.

Continue reading ““Run-It-Back” – Db2 for z/OS Development all new “2024 Swat Tales””

“Run-It-Back” – Db2 for z/OS Development all new SWAT Tales for 2023

Download PDF

Watch recording (logged in Tridex members only)

Session title: “Run-It-Back” – Db2 for z/OS Development all new SWAT Tales for 2023

Session abstract: The session will concentrate on new SWAT team experiences. Various unexpected outcomes and behaviors will be discussed as well has hot technical items customers are exploiting as well as technologies that have been challenging for customers.

Continue reading ““Run-It-Back” – Db2 for z/OS Development all new SWAT Tales for 2023”

New Dimension of Resiliency and Recovery using Db2, Cyber Vault, and Safeguarded Copies

Download PDF

Watch recording (logged in Tridex members only)

Session title: New Dimension of Resiliency and Recovery using Db2, Cyber Vault, and Safeguarded Copies

Session abstract: Session will be a Db2 focused Cyber Vault overview concentrating the basic concepts, Db2 involvement, data consistency validation.

Continue reading “New Dimension of Resiliency and Recovery using Db2, Cyber Vault, and Safeguarded Copies”

The steps and techniques needed for mass recovery including Db2 recovery from cyber-attacks

Download PDF

Watch recording (logged in Tridex members only)

Session title: The steps and techniques needed for mass recovery including Db2 recovery from cyber-attacks

Session abstract: The challenge of mass Db2 recovery is overwhelming and challenging but rarely is tested. Disaster Recovery testing often occurs multiple times a calendar year, but local recovery testing especially mass application recovery rarely is tested. Continue reading “The steps and techniques needed for mass recovery including Db2 recovery from cyber-attacks”