DB2 UDB Exploitation of the Windows Environment

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

Published 06 March 2003, updated 05 March 2004

cover image

ISBN-10: 0738427985
ISBN-13: 9780738427980
IBM Form #: SG24-6893-00
(564 pages)

More options

Rate and comment

Authors: Whei-Jen Chen, Chris Fierros, Alexandre H. Guerra, Thomas Mitchell, Francis Reddington

Abstract

Although roughly ninety percent of DB2 Universal Database (UDB) on distributed platforms is common code, IBM makes great efforts to exploit the features of each operating system to which it ports; and on Windows, this is no exception. Clearly, the first database product certified for Windows 2000 makes use of more features in the Windows operating system than any other database on the market today and delivers world class record setting price performance.

This IBM Redbooks publication is an informative guide that describes how to effectively implement DB2 UDB V8.1 with Microsoft Windows 2000 operating systems. It is intended for anyone who needs both an introduction and detailed information on installing, configuring, and managing DB2 UDB on Windows.

We begin by exploring the DB2 UDB product family. We cover installation procedures for interactive, unattended, and enterprise deployment. We describe DB2 UDB integration with the Windows domain security model. We discuss system and database performance factors and how to optimize and monitor them as well. We walk you through high availability features including standby and clustered servers. We discuss application development from a DB2 UDB and Windows perspective, providing general tips on building applications and cover integration of the Microsoft development tools.

Table of contents

Chapter 1. Introduction
Chapter 2. Installation and deployment
Chapter 3. Post-installation tasks
Chapter 4. Security
Chapter 5. Performance
Chapter 6. Monitoring and management
Chapter 7. High availability
Chapter 8. Application development
Chapter 9. Windows scripting
Appendix A. Advanced scripting
Appendix B. Sample REXX programs

Others who read this publication also read

Follow IBM Redbooks

Follow IBM Redbooks