09:30 – 10:30 | Robert Catterall, IBM Managing Db2 for z/OS Application Compatibility Levels |
10:30 – 10:45 | Break |
10:45 – 11:45 | Emil Kotrc, Broadcom How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers |
Managing Db2 for z/OS Application Compatibility Levels
Watch recording (logged in Tridex members only)
Session title: Managing Db2 for z/OS Application Compatibility Levels
Session abstract: Application compatibility level is something that was introduced with Db2 11 for z/OS, became more important with Db2 12 and remains important for Db2 13.
Continue reading “Managing Db2 for z/OS Application Compatibility Levels”Managing Db2 for z/OS Application Compatibility Levels
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Managing Db2 for z/OS Application Compatibility Levels”How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers
Watch recording (logged in Tridex members only)
Session title: How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers
Session abstract: The mainframe is often perceived as the world’s most secure platform. The reality, however, is that it is only as secure as you make it.
Continue reading “How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers”