External Procedures, Triggers, and User-Defined Functions on IBM DB2 for i

External Procedures, Triggers, and User-Defined Functions on IBM DB2 for i

Author: Hernando Bedoya

Publisher: IBM Redbooks

Published: 2016-04-25

Total Pages: 436

ISBN-13: 0738441597

DOWNLOAD EBOOK

Procedures, triggers, and user-defined functions (UDFs) are the key database software features for developing robust and distributed applications. IBM Universal DatabaseTM for i (IBM DB2® for i) supported these features for many years, and they were enhanced in V5R1, V5R2, and V5R3 of IBM® OS/400® and V5R4 of IBM i5/OSTM. This IBM Redbooks® publication includes several of the announced features for procedures, triggers, and UDFs in V5R1, V5R2, V5R3, and V5R4. This book includes suggestions, guidelines, and practical examples to help you effectively develop IBM DB2 for i procedures, triggers, and UDFs. The following topics are covered in this book: External stored procedures and triggers Java procedures (both Java Database Connectivity (JDBC) and Structured Query Language for Java (SQLJ)) External triggers External UDFs This publication also offers examples that were developed in several programming languages, including RPG, COBOL, C, Java, and Visual Basic, by using native and SQL data access interfaces. This book is part of the original IBM Redbooks publication, Stored Procedures, Triggers, and User-Defined Functions on DB2 Universal Database for iSeries, SG24-6503-02, that covered external procedures, triggers, and functions, and also SQL procedures, triggers, and functions. All of the information that relates to external routines was left in this publication. All of the information that relates to SQL routines was rewritten and updated. This information is in the new IBM Redbooks publication, SQL Procedures, Triggers, and Functions on IBM DB2 for i, SG24-8326. This book is intended for anyone who wants to develop IBM DB2 for i procedures, triggers, and UDFs. Before you read this book, you need to know about relational database technology and the application development environment on the IBM i server.


Advanced Functions and Administration on DB2 Universal Database for ISeries

Advanced Functions and Administration on DB2 Universal Database for ISeries

Author: Hernando Bedoya

Publisher:

Published: 2001

Total Pages: 366

ISBN-13:

DOWNLOAD EBOOK

Dive into the details of DB2 Universal Database for iSeries advanced functions and database administration. This IBM Redbooks publication aims to equip programmers, analysts, and database administrators with all the skills and tools necessary to take advantage of the powerful features of the DB2 Universal Database for iSeries relational database system. It provides suggestions, guidelines, and practical examples about when and how to effectively use DB2 Universal Database for iSeries. This book contains information that you may not find anywhere else, including programming techniques for the following functions: - Referential integrity and check constraints - DRDA over SNA, DRDA over TCP/IP, and two-phase commit - DB2 Connect - Import and Export utilities This book also offers a detailed explanation of the new database administration features that are available with Operations Navigator in V5R1. Among the tools, you will find: - Database Navigator - Reverse engineering and Generate SQL - Visual Explain - Database administration using Operations Navigator With the focus on advanced functions and administration in this fourth edition of the book, we moved the information about stored procedures and triggers into a new book -- "Stored Procedures and Triggers on DB2 Universal Database for iSeries", SG24-6503.


Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between

Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between

Author: Nadir K. Amra

Publisher: IBM Redbooks

Published: 2015-12-07

Total Pages: 712

ISBN-13: 073843986X

DOWNLOAD EBOOK

This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization. This book covers key trends for application structure, user interface, data access, and the database. Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization. Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs). This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders. Related information Making the Case for Modernization, IBM Systems Magazine


IBM System i Security: Protecting i5/OS Data with Encryption

IBM System i Security: Protecting i5/OS Data with Encryption

Author: Yessong Johng

Publisher: IBM Redbooks

Published: 2008-07-24

Total Pages: 308

ISBN-13: 0738485373

DOWNLOAD EBOOK

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.


MySQL to DB2 Conversion Guide

MySQL to DB2 Conversion Guide

Author: Whei-Jen Chen

Publisher: IBM Redbooks

Published: 2009-12-01

Total Pages: 476

ISBN-13: 0738433659

DOWNLOAD EBOOK

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and guidance, converting from MySQL to IBM® DB2® is not only feasible but straightforward. If you picked up this book, you are most likely considering converting to DB2 and are probably aware of several of the advantages of to converting to DB2 data server. In this IBM Redbooks® publication, we discuss in detail how you can take advantage of this industry leading database server. This book is an informative guide that describes how to convert the database system from MySQLTM 5.1 to DB2® V9.7 on Linux® and the steps that are involved in enabling the applications to use DB2 instead of MySQL. This guide also presents the best practices in conversion strategy and planning, conversion tools, porting steps, and practical conversion examples. It is intended for technical staff that is involved in a MySQL to DB2 conversion project.