Skip to main content

DB2 UDB Exploitation of the Windows Environment

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 06 March 2003, updated 05 March 2004

  1. .PDF (7.1 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738427985
ISBN-13: 9780738427980
IBM Form #: SG24-6893-00


Authors: Whei-Jen Chen, Chris Fierros, Alexandre H. Guerra, Thomas Mitchell and Francis Reddington

    menu icon

    Abstract

    Although roughly ninety percent of DB2 Universal Database (UDB) on distributed platforms is common code, IBM makes great efforts to exploit the features of each operating system to which it ports; and on Windows, this is no exception. Clearly, the first database product certified for Windows 2000 makes use of more features in the Windows operating system than any other database on the market today and delivers world class record setting price performance.

    This IBM Redbooks publication is an informative guide that describes how to effectively implement DB2 UDB V8.1 with Microsoft Windows 2000 operating systems. It is intended for anyone who needs both an introduction and detailed information on installing, configuring, and managing DB2 UDB on Windows.

    We begin by exploring the DB2 UDB product family. We cover installation procedures for interactive, unattended, and enterprise deployment. We describe DB2 UDB integration with the Windows domain security model. We discuss system and database performance factors and how to optimize and monitor them as well. We walk you through high availability features including standby and clustered servers. We discuss application development from a DB2 UDB and Windows perspective, providing general tips on building applications and cover integration of the Microsoft development tools.

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Installation and deployment

    Chapter 3. Post-installation tasks

    Chapter 4. Security

    Chapter 5. Performance

    Chapter 6. Monitoring and management

    Chapter 7. High availability

    Chapter 8. Application development

    Chapter 9. Windows scripting

    Appendix A. Advanced scripting

    Appendix B. Sample REXX programs

     

    Others who read this also read