Wisconsin DB2 Users Group

Aurora St. Luke’s South Shore 5900 S. Lake Dr., Cudahy, WI, United States

SEGUS & SOFTWARE ENGINEERING present Compliance with compliments! Viable DB2 z/OS workload tracking.    Presentation Audit and Compliance is one of the big challenges companies are facing these days. This presentation shows how the entire DB2 workload can be tracked without the overhead of a trace, or monitor, enabling to answer Who did What When ‐ whenever

Midwest Database User Group

IBM TEC Hyatt Building, 71 South Wacker Drive, Chicago, IL, United States

SEGUS & SOFTWARE ENGINEERING proudly sponsor this event and present: Compliance with compliments! Viable DB2 z/OS workload tracking.     Presentation Audit and Compliance is one of the big challenges companies are facing these days. This presentation shows how the entire DB2 workload can be tracked without the overhead of a trace, or monitor, enabling to answer Who

Atlanta DB2 Users Group

IBM Corp (Building A) - Technical Exploration Center 6303 Barfield Rd., NE, Atlanta, GA

SEGUS & SOFTWARE ENGINEERING present Compliance with compliments! Viable DB2 z/OS workload tracking.   Presentation Audit and Compliance is one of the big challenges companies are facing these days. This presentation shows how the entire DB2 workload can be tracked without the overhead of a trace, or monitor, enabling to answer Who did What When ‐

Heart of America DB2 Users Group

Kansas University - Edwards Campus 12600 Quivira Rd, Overland Park, Kansas, Vereinigte Staaten

HOADUG 2016 - Meet us at the Heart of America DB2 User’s Group

ASAP University 2016

Hyatt regency Tamaya Santa Ana Pueblo, NM, United States

Reaching New Heights with Workload Automation

IDUG 2016 DB2 North American Tech Conference

Renaissance Austin Hotel 9721 Arboretum Boulevard, Austin, TX, United States

SEGUS & SOFTWARE ENGINEERING present DB2 z/OS Audit - Viable workload tracking Tuesday, May 24th, 2016 - 1pm;  Room Trinity B Session V02 Learn how you can run Audit analytics against a long‐term repository, pinpointing who executed a query, when and from where. Analyze your entire workload to understand access patterns and abnormalities.  Audit needs and