This video on managing database security is part eleven of an overview of key DBA features in Toad for DB2 z/OS.
Related Articles
How to register new users from Toad Data Point to Toad Intelligence...
This video demonstrates how to register new users from Toad Data Point to Toad Intelligence Central using Windows authentication....
Using Toad Edge 1.1 with MySQL on AWS EC2 – Part I
Introduction MySQL database may be run on several cloud platforms that provide managed services for MySQL. AWS Relational Database Service (RDS) is one such managed service for relational databases, i...
Toad for Oracle – When I try to run my procedure through the debugger,...
Check to see whether you have an object named the same as the owner of the procedure. When this is the case, Oracle thinks that the user name in the anonymous block is actually the object name. We rec...
