In this article, we'll building the SQL request dynamically.
Written by Bruce Vining
In the January 2015 CL Corner, Enhancing WRKQRY Reports the Easy Way, we saw how to create an SQL view for use by WRKQRY using the Run SQL (RUNSQL) CL command. I received quite a few notes asking, among other things, for an example of how to build the RUNSQL SQL parameter using variables rather than the static approach taken in the previous article. So today we'll look at what's required to build the SQL parameter using variables/parameters. For demonstration purposes, we'll continue to use the PROJECTS file that was introduced in the previous article.
Calling all CDOs! Here’s a playbook for your newly created role! Every chief data officer needs this practical guide to help you manage your data governance program. Data governance guru Sunil Soares walks you through the CDO’s role and provides valuable industry insight into the CDO reporting relationship, scope and authority level, and alignment with the CIO role. You’ll explore data policies, standards, and processes and learn approaches to monitoring and enforcing compliance. Get your copy today!
Soon after a new version of software is made available to existing customers, it doesn't take long for discussions to arise between the technical and business leadership within a company on when to upgrade. The development teams drool over the productivity and performance benefits offered by the new version while the IT executives fixate on the costs and risks associated with upgrading to the latest software version.
Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:
IBM’s analytics and services strategy
the repackaged DB2 Web QueryV2.1
IBM’s Cognos solution
other BI software in the market
The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.
It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.
With big data comes big responsibility, but it doesn't have to stress you out, especially when it comes to accessing partitioned files. You can learn how to adapt to the trends and take control of your partitioned data without losing the ability to query multiple files at once. Download the free Big Data Access Pack today! Download Your Free Copy.
Left to their own preferences, many programmers will ask to be given all possible authorities on the system. That’s because most – not all – but most programmers are focused on getting their work done and would prefer not to be concerned with security. However, many organizations have policies or have to comply with laws or regulations that limit the authorities that programmers can have – especially to production systems. This white paper describes the authorities that programmers typically need along with techniques for determining the exact authorities your programmers need to continue to perform their job functions without having an all-powerful profile.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.
Introduction to Configuring iAccess Servers to use SSL
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.