TechTips / Database


Partner TechTip: Data Access on IBM i PDF Print E-mail
Tips & Techniques - Database
Written by Mike Stegeman   
Friday, 05 September 2014 00:00

Is it time to upgrade from Query/400?

mike stegemanWritten by Mike Stegeman

For over 30 years, Query/400 has been the data access tool to generate reports easily from DB2 data, allowing access to insight like never before. While it continues to be sufficient for basic reporting functionality, most organizations are beginning to be challenged with the need to access and report on larger volumes of data.

Add a comment
Last Updated on Friday, 05 September 2014 00:00
Read more...
 
TechTip: Protecting Against Accidental Updates with Masked Values PDF Print E-mail
Tips & Techniques - Database
Written by Kent Milligan   
Friday, 22 August 2014 00:00

DB2 for I 7.2 delivers a feature that can increase the integrity of your database.

kent milligan 117x117Written by Kent Milligan

With the intense focus on data privacy, many applications are being modified to protect the personal data that they are processing. Masking is a data protection technique that's commonly being deployed so that the vast majority of application users are allowed to see only a masked version (############1234) of sensitive data values, such as credit card numbers. Access to the original card number value is limited to a select set of privileged users.

Add a comment
Last Updated on Friday, 22 August 2014 00:00
Read more...
 
User Rating: / 1
PoorBest 
Partner TechTip: How SEQUEL Handles Big Data PDF Print E-mail
Tips & Techniques - Database
Written by Mike Stegeman   
Friday, 25 July 2014 00:00

Big data: A big opportunity to improve business.
mike stegemanWritten by Mike Stegeman

Big data is one of the biggest buzzwords in IT right now. A lot of companies are clamoring to set up advanced analytics tools and establish business processes that help them make sense of the troves of information now passing through their systems. The goal? To improve decision-making and be in a good position to respond to changing conditions.

Add a comment
Last Updated on Friday, 18 July 2014 10:16
Read more...
 
TechTip: Biting the Bullet: Options for DB2 for i Automated Testing PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 18 July 2014 00:00

This tip brainstorms a few approaches for automatically testing various aspects of DB2 for i code.

Written by Michael Sansoterra

In the first tip, I showed various ways to test DB2 functions, procedure results, and triggers for logic accuracy and security. However, the tip never covered how these tests, once written, are to be processed. In particular, questions such as these need further discussion:

Add a comment
Last Updated on Friday, 18 July 2014 00:00
Read more...
 
User Rating: / 2
PoorBest 
TechTip: New Function Resolution Casting Rules for DB2 PDF Print E-mail
Tips & Techniques - Database
Written by Kent Milligan   
Friday, 11 July 2014 00:00

They may be obscure, but they're definitely not to be overlooked.

kent milligan 117x117Written by Kent Milligan

My recent article on the DB2 for i 7.2 release highlighted some of the more noteworthy database enhancements in the latest IBM i release. There wasn't room in the previous article to discuss all of the DB2 enhancements, so in this article you'll learn about a smaller DB2 improvement known as function resolution casting rules.

Add a comment
Last Updated on Friday, 11 July 2014 10:26
Read more...
 
TechTip: Suggestions for DB2 for i Code Quality Testing PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 11 July 2014 00:00

Prepare to put your DB2 SQL code "through the ringer" to ensure it's ready for prime time.

Written by Michael Sansoterra

Typically, developers love writing new code. And while an application is new and business rules are fresh in the mind, it's generally pleasurable to enhance code as change requests meander in. But after the years roll on, and business requirements are forgotten, and complex code looks unfamiliar, then maintaining the code can get downright ugly. How does one know an obscure business rule wasn't violated when changing code?   It's usually not until code has been moved into production that the misery starts after a bug rears its ugly head.

Add a comment
Last Updated on Wednesday, 09 July 2014 11:30
Read more...
 
TechTip: DB2 for i Impersonation Take 2: External Routines PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 13 June 2014 00:00

Use these external SQL routines as an alternative to the somewhat restrictive SET SESSION AUTHORIZATION statement.

Written by Michael Sansoterra

In "Impersonate Your Neighbor Using DB2 for i," I outlined how to use the SET SESSION AUTHORIZATION SQL statement to override the user profile of the current thread or, in many cases, the current job. The benefits of doing this include providing temporary authorization to resources such as IFS files and impersonating another user so that user-dependent code will be tricked into thinking that a different user is running it. However, there are a few restrictions on this statement that can limit its usefulness. In this tip, I'll introduce some external SQL routines (written in RPG) that allow an application to override the user profile without some of the restrictions of the built-in DB2 functionality.

Add a comment
Last Updated on Friday, 13 June 2014 00:00
Read more...
 
TechTip: Impersonate Your Neighbor Using DB2 for i PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 06 June 2014 00:00

Learn how to override the current user profile handle with a different user profile in DB2.

Written by Michael Sansoterra

For most database-related applications, using adopted authority is the preferred way to temporarily grant users controlled access to sensitive data. But one limitation of the adopted authority model is that it doesn't override IFS permissions. A second limitation is that the adopted authority model doesn't allow an application to "impersonate" another user. To help with these issues, the DB2 for i statement SET SESSION AUTHORIZATION provides a way to overcome both of these limitations.

Add a comment
Last Updated on Thursday, 05 June 2014 13:16
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 14

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM