For IBM's relational database DB2, this year is very special. It has been 25 years since its first release. It not only represents the long-term development of DB2, it also indicates that relational databases have been used in enterprises for 25 years.
In the next version of DB2 9.5, the current name is DB2 X, which is also the meaning of the Roman numerals 10 ), there are four major development directions: Continue to support 64-bit computing environments, reduce CPU usage, and support more online database change processing forms, and further comply with the requirements of information security and regulations.
DB2 has made some of the support for the memory logical addressing space on the 64-bit platform, but there are still some incomplete support for the Virtual Storage, and the next version is planned to be adjusted.
In terms of performance improvement, IBM wants to continue to reduce the CPU resource usage. In 9.0 compatible mode and use mode, it has completed to a certain extent, to X, the computing workload is expected to be several times lower than the previous version.
In terms of availability, DB2 is expected to make the database more able to operate online change jobs, such as enhancing the usability and efficiency of online REORG, while allowing online adjustment of the outline online schema change, you can also use the ALTER command and online reorganization, and modify more attributes.
DB2 X is also expected to launch secondary audits, numeric value plus blocking Allow masking of value), and more detailed permission control functions to implement data retention and Smart Data Protection, this is mainly to meet the needs of enterprise capital and regulations.
Taking queries As an example, we can only search for the current data. We will add the "As of" mechanism in the future, and use DB2 to help you record the data's access status at a certain time, you can specify a time point for future queries, which is similar to version control.
In terms of permission control, although the so-called multiple security levels of Multilevel security can be applied in DB2 8, it is restricted to only allowing users to access certain fields in the data table; To DB2 X, it will go from the Level of each record to the Cell Level. Management permissions will also be clearer, separating the data access permissions required by system managers from the monitoring permissions of security managers.