Information About
Friday, 24 July 2009
40 years of CICS in 40 seconds
Posted on 10:30
by Unknown
Email This
BlogThis!
Share to X
Share to Facebook
Posted in
|
No comments
Newer Post
Older Post
Home
0 comments:
Post a Comment
Subscribe to:
Post Comments (Atom)
Popular Posts
Managing DB2 for z/OS Application Performance
Applications that access databases are only as good as the performance they achieve. And every user wants their software to run as fast as ...
DB2 for z/OS Version 9 Beta Announcement
On May 2, 2006 IBM announced the beta for the next version of mainframe DB2: namely, DB2 V9.1 for z/OS. You can view the announcement here ....
DB2 Locking, Part 5: Lock Suspensions, Timeouts, and Deadlocks
The longer a lock is held, the greater the potential impact to other applications. When an application requests a lock that is already held ...
Mainframes Rock!
It is good to see mainframes getting some positive press again. I'm talking about this November 17, 2005 article published in InfoWorld...
DB2 Hashing and Hash Organized Tables
Up until DB2 10, all DB2 data was retrieved using some form of indexing or scanning. With DB2 Version 10, a new access method called hashing...
DB2 Locking, Part 2: Table Space and Table Locks
Today's post is the second in our DB2 locking series and it covers the topic of table space and table locks. Table Space Locks A table s...
DB2 Locking, Part 8: LOBs and Locking
When a row is read or modified in a table containing LOB columns, the application will obtain a normal transaction lock on the base table. T...
Implicitly Hidden Columns [DB2 9 for z/OS]
Another nice new feature deep in the bowels of DB2 9 for z/OS is the ability to hide columns from the SELECT * statement. As far back as any...
Upcoming Webinar: Data Security in the Age of Regulatory Compliance
Webinar Title: Data Security in the Age of Regulatory Compliance Presenter: Craig S. Mullins Date: Wednesday, January 23 Time: 2pm Easte...
Adding Column Names to an Unload File
I received an e-mail from a reader asking an interesting question. She wanted to know if any of the DB2 unload utilities are able to include...
Categories
.NET
ACID
ALTER
analytics
articles
automation
award
backup
best practices
BETWEEN
BI
Big Data
BIND
blogging
book review
bufferpool
buffers
CASE
change management
claim
Cognos
COMMIT
compliance
compression
conference
constraints
COPY
data
data breaches
data quality
data security
Data Sharing
data types
data warehouse
database archiving
database auditing
database design
date
DB2
DB2 10
DB2 11
DB2 9
DB2 Analystics Accelerator
DB2 Catalog
DB2 conversion
DB2 Developer's Guide
DB2 X
DB2-L
DBA
DDL
developerWorks
dirty read
DISPLAY
DL/1
drain
DSNZPARM
Dynamic SQL
eBook
education
enclave SRB
encryption
ERP
FETCH FIRST
Freakonomics
functions
generosity factor
Happy Holidays
Happy New Year
Hibernate
HIPAA
history
IBM
ICF
IDUG
IFL
IMS
index
Information Agenda
Informix
InfoSphere
infrastructure
integrity
IOD
IOD11
IOD2009
IOD2011
IODGC
IRLM
ISOLATION
Java
JDBC
load balancing
LOBs
locking
LUW
mainframe
Malcolm Gladwell
manuals
memory
middleware
migration
misc
monitoring
natural key
Netezza
new blog location
NoSQL
nulls
OLAP
optimization
Oracle versus DB2
packages
PCI-DSS
performance
PIECESIZE
poll
primary key
production data
programming
Q+A
QMF
REBIND
recovery
RedBook
regulatory compliance
reliability
REORG
research
RI
RTO
salaries
SAP
scalability
security
smarter planet
SoftwareOnZ
sort
SOX
specialty processors
SPUFI
SQL
Stage 1
Stage 2
standards
Steelers
storage
stored procedures
stream computing
surrogate key
SYSADM
Sysadmin
table expressions
table space
TechDoc
tips and tricks
Top Ten
trace
training
triggers
Twitter
UDFs
UNION
unstructured data
user groups
utilities
V1
V10
V2
V3
V4
V5
V6
V7
V8
V9
variables
views
VOLATILE
Web 2.0
webinar
Wordle
XML
z/OS
zAAP
zIIP
Blog Archive
►
2014
(2)
►
January
(2)
►
2013
(50)
►
December
(6)
►
November
(6)
►
October
(5)
►
September
(5)
►
August
(3)
►
July
(7)
►
June
(4)
►
May
(4)
►
April
(5)
►
March
(1)
►
February
(2)
►
January
(2)
►
2012
(17)
►
December
(1)
►
November
(2)
►
October
(3)
►
August
(2)
►
July
(1)
►
May
(1)
►
April
(1)
►
March
(2)
►
February
(2)
►
January
(2)
►
2011
(27)
►
December
(1)
►
November
(1)
►
October
(6)
►
September
(2)
►
August
(3)
►
July
(2)
►
June
(3)
►
May
(2)
►
April
(3)
►
March
(1)
►
February
(3)
►
2010
(29)
►
December
(1)
►
October
(6)
►
September
(1)
►
August
(2)
►
July
(2)
►
June
(1)
►
May
(3)
►
April
(3)
►
March
(3)
►
February
(4)
►
January
(3)
▼
2009
(43)
►
December
(5)
►
November
(4)
►
October
(6)
►
September
(2)
►
August
(1)
▼
July
(3)
Discount on IBM Information on Demand Conference
40 years of CICS in 40 seconds
The "Dirty" Read (AKA Uncommitted Read)
►
June
(2)
►
May
(3)
►
April
(2)
►
March
(4)
►
February
(5)
►
January
(6)
►
2008
(44)
►
December
(1)
►
November
(4)
►
October
(4)
►
September
(6)
►
August
(1)
►
July
(4)
►
June
(3)
►
May
(5)
►
April
(4)
►
March
(4)
►
February
(2)
►
January
(6)
►
2007
(51)
►
December
(2)
►
November
(3)
►
October
(5)
►
September
(3)
►
August
(6)
►
July
(4)
►
June
(4)
►
May
(5)
►
April
(8)
►
March
(5)
►
February
(4)
►
January
(2)
►
2006
(60)
►
November
(4)
►
October
(8)
►
September
(4)
►
August
(11)
►
July
(7)
►
June
(2)
►
May
(7)
►
April
(3)
►
March
(6)
►
February
(4)
►
January
(4)
►
2005
(11)
►
December
(3)
►
November
(6)
►
October
(2)
Powered by
Blogger
.
About Me
Unknown
View my complete profile
0 comments:
Post a Comment