Skip to main content

DB2 Features that ease development and administration

IBM® DB2® for Linux, UNIX and Windows introduces new features to help your organization leverage analytics for better decision making, improve performance, ease database administration, streamline development, and lower data management costs.

1.     Autonomics:

Automate tasks such as memory allocation, storage management and business policy maintenance, enabling IT staff to focus on new and strategic projects.

2.       BLU Acceleration:

Simplify analytics and reporting with breakthrough speed. Take advantage of dynamic in-memory technology and other innovations for faster insights from more data to make better decisions.

3.     Data Warehouse Analytics:

Provide high performing predictive and pattern analysis without moving your data into proprietary data mining platforms.

4.       High Availability:

Help ensure your database remains operational both during planned or unplanned outages. Reduced down-time enables you to meet strict Service Level Agreements (SLAs) with no loss of data during infrastructure failures.

5.       NoSQL Support:

Afford you the freedom to choose the most appropriate data model for each data management challenge.

6.     Performance Optimization:

Save money and lower risks by helping you to do more with your system. Help ensure Service Level Agreements (SLAs) are met or exceeded and increase DBA productivity.

7.     pureScale:

Offer clustering technology that deliver high availability and exceptional scalability transparent to applications for business continuity.

8.     pureXML:

Store, process and manage XML data in its native hierarchical format. Minimize administrative overhead, simplify database design, and reduce the complexity of your XML applications.

9.     Security:

Include a comprehensive suite of security features that effectively and decisively minimize threats: authentication, authorization, trusted context, auditing, encryption, and fine-grain controls.

10. SQL compatibility:

Minimize the cost and risk of moving legacy applications built for the Oracle® Database to DB2. Best of all, your staff can leverage existing skills and hit the ground running.

11.  Storage Optimization:

Reduce storage costs and increase performance with industry leading technologies that compress tables, indexes, archive logs, temporary space, LOBs, XML, and back-up data

12. Time Travel Query:


Travel to the past and the future, and query your data as it appears at different points in time without having to build, maintain, and administer a complex temporal infrastructure.

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                              B. Android Debug Bridge.            C. Android Destroy Bridge.                          D. Android Delete Bridge. 5. Is list data type supported by AIDL? a. Yes    b. No 6. Component which is NOT under the Android application. a. Content providers      b. Resource externalization         c. Applications d. Notifications 7. Language which is supported by Android for application dev

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.