Skip to content

Join us at Central PA DB2 Users Group

June 5, 2015

Central PA Regional DB2 User Group

Date: Wednesday June 10, 2015

Place: Giant Super Food Store Community Room, 3301 Trindle Road, Camp Hill, PA 17011

Cost: FREE

Reservations: Email: Odessa Fennen –


Agenda for June 10, 2015

8:30-9:00 Breakfast & Announcements

Sponsored By Gunning Technology Solutions, LLC

9:00-10:15 “Exploiting zIIP Capacity with DB2 for z/OS

Presenter:  Randy Ebersole, IBM

The System z Integrated Information Processor (zIIP) became generally available in 2006 with the z9® architecture. It was introduced to provide a way to have new workload run on the mainframe, by allowing certain workloads to run on the zIIP capacity, without that capacity incurring IBM software costs. This presentation will provide an update on all of the ways DB2 for z/OS exploits the zIIP processor. Monitoring of DB2 and zIIP usage will also be discussed so that the attendee can best understand how to recognize the impact of exploiting zIIP capabilities.

10:15-10:30 Break

10:30-11:45   “What’s new about buffer management using DB2 11 for z/OS

Presenter: Randy Ebersole, IBM

This session explains some buffer pool tuning considerations when using DB2 11 for z/OS.  We will discuss some changes that affect the performance of DB2’s deferred writes and castout processing.    We’ll discuss improvements to DB2 buffer metrics that improve your ability to tune your buffer pools.  We’ll explain how to better manage real storage and minimize CPU consumption.  11:45 -1:00   Lunch – Sponsored By: Gunning Technology Solutions, LLC

1:00-2:15   “Table Monitors, What’s on the Table?”

Presenter:  Leo Pedron, LJP Consulting/Gunning Technology Solutions, LLC

An introduction into using table function monitoring to replace traditional snapshots. Snapshot monitoring has been deprecated in DB2 9.7 and a new lightweight monitoring architecture introduced. Attend this session to learn how to use the new monitoring facilities to replace your former snapshot monitoring in DB2 10.5.

2:15–2:30 Break

2:30-3:45  “Protecting Big Data”

Presenter: Howie Hirsch, IBM

Hackers are everywhere. Is it possible to keep ahead of them? If not, what is the next best thing, which is to provide real time monitoring to reduce the time it takes to discover a data breach is occurring in your shop, and stop it before it can cause damage. We will discuss the ways that this is possible and the items that you need to be on the lookout for to be able to give your enterprise world class protection.  3:45-4:00 Closing

From → Uncategorized

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: