External Procedures, Triggers, and User-Defined Functions on IBM DB2 for i


Book Description

Procedures, triggers, and user-defined functions (UDFs) are the key database software features for developing robust and distributed applications. IBM Universal DatabaseTM for i (IBM DB2® for i) supported these features for many years, and they were enhanced in V5R1, V5R2, and V5R3 of IBM® OS/400® and V5R4 of IBM i5/OSTM. This IBM Redbooks® publication includes several of the announced features for procedures, triggers, and UDFs in V5R1, V5R2, V5R3, and V5R4. This book includes suggestions, guidelines, and practical examples to help you effectively develop IBM DB2 for i procedures, triggers, and UDFs. The following topics are covered in this book: External stored procedures and triggers Java procedures (both Java Database Connectivity (JDBC) and Structured Query Language for Java (SQLJ)) External triggers External UDFs This publication also offers examples that were developed in several programming languages, including RPG, COBOL, C, Java, and Visual Basic, by using native and SQL data access interfaces. This book is part of the original IBM Redbooks publication, Stored Procedures, Triggers, and User-Defined Functions on DB2 Universal Database for iSeries, SG24-6503-02, that covered external procedures, triggers, and functions, and also SQL procedures, triggers, and functions. All of the information that relates to external routines was left in this publication. All of the information that relates to SQL routines was rewritten and updated. This information is in the new IBM Redbooks publication, SQL Procedures, Triggers, and Functions on IBM DB2 for i, SG24-8326. This book is intended for anyone who wants to develop IBM DB2 for i procedures, triggers, and UDFs. Before you read this book, you need to know about relational database technology and the application development environment on the IBM i server.




Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between


Book Description

This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization. This book covers key trends for application structure, user interface, data access, and the database. Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization. Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs). This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders. Related information Making the Case for Modernization, IBM Systems Magazine




IBM System i Security: Protecting i5/OS Data with Encryption


Book Description

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.




SQL Procedures, Triggers, and Functions on IBM DB2 for i


Book Description

Structured Query Language (SQL) procedures, triggers, and functions, which are also known as user-defined functions (UDFs), are the key database features for developing robust and distributed applications. IBM® DB2® for i supported these features for many years, and they are enhanced in IBM i versions 6.1, 7.1, and 7.2. DB2 for i refers to the IBM DB2 family member and relational database management system that is integrated within the IBM Power operating system that is known as IBM i. This IBM Redbooks® publication includes several of the announced features for SQL procedures, triggers, and functions in IBM i versions 6.1, 7.1, and 7.2. This book includes suggestions, guidelines, and practical examples to develop DB2 for i SQL procedures, triggers, and functions effectively. This book covers the following topics: Introduction to the SQL/Persistent Stored Modules (PSM) language, which is used in SQL procedures, triggers, and functions SQL procedures SQL triggers SQL functions This book is for IBM i database engineers and data-centric developers who strive to provide flexible, extensible, agile, and scalable database solutions that meet business requirements in a timely manner. Before you read this book, you need to know about relational database technology and the application development environment on the IBM Power SystemsTM with the IBM i operating system.




DB2 9 for Z/OS Stored Procedures


Book Description




Data Studio and DB2 for z/OS Stored Procedures


Book Description

Stored procedures can provide major benefits in the areas of application performance, code re-use, security, and integrity. DB2® has offered ever-improving support for developing and operating stored procedures. This IBM® RedpaperTM publication is devoted to tools that can be used for accelerating the development and debugging process, in particular to the stored procedure support provided by the latest and fastest evolving IBM product: Data Studio. We discuss topics related to handling stored procedures across different platforms. We concentrate on how to use tools for deployment of stored procedures on z/OS®, but most considerations apply to the other members of the DB2 family. This paper is a major update of Part 6, "Cool tools for an easier life," of the IBM Redbooks® publication DB2 9 for z/OS Stored Procedures: Through the CALL and Beyond, SG24-7604.




MySQL to DB2 Conversion Guide


Book Description

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and guidance, converting from MySQL to IBM® DB2® is not only feasible but straightforward. If you picked up this book, you are most likely considering converting to DB2 and are probably aware of several of the advantages of to converting to DB2 data server. In this IBM Redbooks® publication, we discuss in detail how you can take advantage of this industry leading database server. This book is an informative guide that describes how to convert the database system from MySQLTM 5.1 to DB2® V9.7 on Linux® and the steps that are involved in enabling the applications to use DB2 instead of MySQL. This guide also presents the best practices in conversion strategy and planning, conversion tools, porting steps, and practical conversion examples. It is intended for technical staff that is involved in a MySQL to DB2 conversion project.




Building the Data Warehouse


Book Description

The data warehousing bible updated for the new millennium Updated and expanded to reflect the many technological advances occurring since the previous edition, this latest edition of the data warehousing "bible" provides a comprehensive introduction to building data marts, operational data stores, the Corporate Information Factory, exploration warehouses, and Web-enabled warehouses. Written by the father of the data warehouse concept, the book also reviews the unique requirements for supporting e-business and explores various ways in which the traditional data warehouse can be integrated with new technologies to provide enhanced customer service, sales, and support-both online and offline-including near-line data storage techniques.