Ron,

I am not sure I understand your question.  Can you clarify?

Rob Schramm
Senior Systems Consultant
Imperium Group



On Wed, Nov 16, 2011 at 12:05 PM, Ron Thomas <[email protected]> wrote:
> One thing i would like to know is if we go with the built in scalar function 
> encrypt/decrypt  for the tables, does that need any kind of application level 
> changes? is there any kind of limitation with this approach?
>
> Regards
> Ron
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to