Ron, I am not sure I understand your question. Can you clarify?
Rob Schramm Senior Systems Consultant Imperium Group On Wed, Nov 16, 2011 at 12:05 PM, Ron Thomas <[email protected]> wrote: > One thing i would like to know is if we go with the built in scalar function > encrypt/decrypt for the tables, does that need any kind of application level > changes? is there any kind of limitation with this approach? > > Regards > Ron > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

