Solved

Anyone know the query syntax for calling a Stored Procedure in DB2?

Posted on 2002-04-15
3
243 Views
Last Modified: 2011-09-20
I would like to start using stored procedures in DB2 with JSP, but I don't know the query syntax and the IBM site is almost useless.

Anyone have query examples they can share?
Thanks
0
Comment
Question by:cgttsp01
  • 2
3 Comments
 
LVL 51

Expert Comment

by:Ryan Chong
ID: 6943739
0
 
LVL 19

Accepted Solution

by:
cheekycj earned 50 total points
ID: 6944855
calling a stored proc in JSP is the same as in standard Java.  Use the CallableStatement Object.

http://www.j-netdirect.com/GenStoredProcedures.htm
http://java.sun.com/docs/books/tutorial/jdbc/basics/sql.html

Sun's entire tutorial is an excellent resource:
http://java.sun.com/docs/books/tutorial/jdbc/index.html

for db2 specific info:
http://www.redbooks.ibm.com/pubs/pdfs/redbooks/sg245945.pdf

CJ
0
 
LVL 19

Expert Comment

by:cheekycj
ID: 8692632
Thanx for the "A" and good luck.

CJ
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question