Wisconsin DB2 Users Group (WDUG)


Wisconsin DB2 Users Group (WDUG)

The Wisconsin DB2 Users’ Group meets triannually (March, June, & September) at various locations in the vicinity of Milwaukee, Wisconsin. 

WDUG is a non-profit organization run by users of the IBM DB2 family of products to promote education and foster communication of DB2 related information to local IT Professionals. All meeting presentations are technical in nature.

Website: http://wdug.com
Location: Milwaukee, WI
Members: 9
Latest Activity: Sep 5, 2017

WDUG Meeting Sept 13, 2017

Date: Wednesday, September 13th, 2017

Kohl's Junior Achievement Building

11111 W Liberty Drive
Milwaukee, WI 53224

The Kohl’s Junior Achievement building is located behind the Hilton Garden Inn. Exit I-41 on Good Hope Road, travel east to 110th Street, turn right on Park Place then make a left on Liberty Drive.

Meeting rooms: Inspirations North and Inspirations South.

Cutoff date for pre-registration is:
Friday September 8, 2017

To register please go to our website at www.wdug.com and select Registration from the Main Menu to complete a registration form. E-mail us at wdug@wdug.com with questions.

Meeting Agenda – September 13, 2017

DB2 for z/OS & DB2 for LUW

8:30- 9:00
Registration – Coffee, juice and rolls

9:00- 9:15
Welcome and IBM Announcements

9:30- 10:30


Db2 for z/OS Provisioning –Heavy Lifting Ahead
Paul Bartak-IBM

  • System provisioning, DevOps, Continuous Delivery / Integration are all modern-day initiatives that accelerate the delivery of business applications. Each may have requirement for a copy of an entire DB2 subsystem or portions thereof to obtain full value. How do you scale your database administration staff to meet the increasing demands of application & BizOps teams, who are, in turn, pressured to meet agile delivery targets?
  • Today’s tools have the capabilities to clone objects and data to efficiently scale your administration teams. In some cases, these tools can use today’s fast copy technology in conjunction with DB2 page set preparation techniques to provide consistent & coherent test or production subsets. The key to fitting in to modern processing is support for REST. The next time you are asked if you can fulfill the data requirements for one of today’s delivery methods, be armed with ideas to get it done.


Migrating an On-Premises DB2 Database to the Cloud
Roger Sanders—IBM

  • There is a bias among many database administrators (DBAs) that public clouds are neither capable of meeting the demands often placed on relational database management systems nor secure enough to house personally identifiable information (PII). Because of this, many DBA’s have limited the use of a public cloud for database deployments. Now, companies are finding that the benefits of cloud computing – faster access to infrastructure, greater scalability, and higher availability top the list . Consequently, cloud adoption is growing and the use of a public cloud for relational database deployments can no longer be avoided. This presentation will explain why DBAs should be thinking about the cloud and provide an overview of IBM’s Db2 cloud offerings: Db2 Hosted, Db2 on Cloud and Db2 Warehouse on Cloud. It will also address some things that must be taken into consideration when migrating a database to the cloud and describe how to keep confidential data secure during a ground-to-cloud migration.

10:45- 12:00


Db2 Analytics Accelerator: What's new and what's coming?
Gary Crupi-IBM

  • The Db2 Analytics Accelerator is a revolutionary technology that complements Db2 for z/OS to transform the mainframe into the industry-leading transaction and analytic processing environment. This architectural approach drives out cost and complexity and enables real-time analytics on live transactional data, so you can leverage your business critical data where it originates. During this session, Gary will discuss the latest enhancements to the Accelerator. He will help you understand how these new developments will strengthen important use cases, such as hybrid transactional and analytical processing (HTAP), and about capabilities that drive new use cases and additional value for your business.


DB2 Security and Compliance
Roger Sanders—IBM

  • Although security and compliance are deeply intertwined, they are not the same. One is used to ensure that something (in our case, data) is only accessed by individuals who have been authorized to access it, while the other is used to ensure that specific controls for how a system or solution is managed are put in place and adhered to. This presentation illustrates how the various security mechanisms that are available with Db2 can be used to "harden" a database such that it meets some of the rules and validation points that are outlined in some of the more common compliance specifications companies must adhere to. (The example compliance specification used is the Health Insurance Portability and Accountability Act of 1996 - otherwise known as HIPAA.).

12:00- 1:15

Lunch - on your own

1:15– 2:30


DB2 12 Continuous Delivery—New Challenges for Deployment
Ulf Heinrich—SEGUS Inc.

  • Starting with version 12, DB2 goes agile and code fixes, as well as new features and functions will be delivered in a continuous stream, so called Continuous Delivery. While this change intends to make new technology available faster than in a three-year cycle it will also affect the way we did DB2 migration and testing before. This presentation provides an overview about DB2 Levels and how they affect the DB2 subsystem, the Catalog/Directory, SQL and DDL. More importantly, I’ll show how changes can be applied safely and what levels of quality assurance and testing can be passed to assure Continuous Delivery goes well with Continuous Availability.


DB2 Data Security: Controlling Access and Catching Bad Guys
Ian Bjorhovde—DataProxy LLC

  • Your DB2 databases hold some of your company’s most valuable assets. As you have seen from the increasingly frequent headlines, data breaches have become an all too common occurrence, and have the potential to cost your company millions of dollars. To protect your DB2 database and the data it holds, there are 4 keys that you must consider: Encryption of Data at Rest, Encryption of Data in Transit, Access Control and Auditing. While encryption will help keep your data safe in the event of a breach, it is equally important to have controls in place that protect legitimate access to this data and allow you to determine who is accessing your data and what data they are seeing to prevent and/or minimize a data breach.

2:45– 4:00


DB2 Stats
Ulf Heinrich—SEGUS Inc.

  • This presentation will provide an overview about the various flavors of RUNSTATs and much more:
    • autonomic Stats
    • the associated Catalog tables
    • how/what affects the optimizer
    • optimizer differences between dynamic and static SQL
    • how to recover from bad statistics


DB2 Data Security: Top 10 Common Mistakes
Ian Bjorhovde—DataProxy LLC

  • Keeping your database secure is a big job, and there are plenty of pitfalls that junior and even senior DBAs often fall into. This presentation will review the 10 most common mistakes I have seen in working with many customers over the past few years. This presentation describe the mistakes, explains how they mistakes were made and how they were resolved.

Discussion Forum

This group does not have any discussions yet.

Comment Wall


You need to be a member of Wisconsin DB2 Users Group (WDUG) to add comments!


Bringing DB2 enthusiasts together virtually. Expert or novice, distributed or mainframe, this is the place for everything DB2.

PlanetDB2.com [Latest Blogs from the Biggest Names in DB2]

© 2018   Created by Surekha Parekh.   Powered by

Badges  |  Report an Issue  |  Terms of Service