Working with Data Virtuality
- Permissions for developers in AD+DTAP scenarios
- Replicating to non-DWH-datasources
- Find Enabled Recommended Optimizations Which Have No Schedule
- How to perform quality control and vulnerability scans in Data Virtuality
- Recommended firewall settings for an on-premise installation of Data Virtuality
- Disabling Data Virtuality ports
- Creating SSH tunnels for DB2 and other multiport databases
- Using the Upsert Stored Procedure to Reproduce the SQL MERGE
- Using S3 to Ingest Data into Redshift
- Selecting the Right Schema When Creating a Data Source
- Create Dependent Replication Jobs