Solved

Backing up DB2 on AIX with TSM

Posted on 2016-11-08
2
19 Views
Last Modified: 2016-11-30
i need configuration help regarding TSM level and DB2 level so please help me
0
Comment
Question by:Member_2_7970151
  • 2
2 Comments
 
LVL 16

Accepted Solution

by:
max_the_king earned 500 total points (awarded by participants)
ID: 41878715
Hi,
since DB2 uses native API to connect to TSM client there is no TDP dedicated module. This makes it eaier for you because you just need to view mtrix compatibility between tsm server and tsm client for a given operating system.
Here is matrix compatibility for cient-server:
http://www-01.ibm.com/support/docview.wss?uid=swg21053218 
here for operating system:
http://www-01.ibm.com/support/docview.wss?uid=swg21243309

and here is a valuable document for AIX:
http://www-01.ibm.com/support/docview.wss?uid=swg21635414

hope this helps
max
0
 
LVL 16

Expert Comment

by:max_the_king
ID: 41906990
I believe this answer is good
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question