July 12, 2019
- LEAD ARTICLE: SQL 101: Using SQL Cursors to Replace Record-Level Data Access, Part 2
- FEATURED ARTICLE: Top Five Misconfigurations That Leave Your IBM i Vulnerable
- FEATURED NEWS: IBM Closes Landmark Acquisition of Red Hat for $34 Billion; Defines Open, Hybrid Cloud Future
- NEWS HIGHLIGHT: Kisco Announces Update For IBM i System Monitoring Tool
- WHITE PAPER: 2019 State of IBM i Modernization
- MC VIDEO SHOWCASE: Design an Invoice in 10 Minutes
- EVENT: IBM i in 2019: It’s Not Just AS/400
Last time around, I introduced the concept of using an SQL cursor as a way to replace the typical RPG opcodes to access data. Now let’s go deeper and find out where cursors can really help you.
By Rafael Victória-Pereira
The previous TechTip explained what a cursor is and how to declare it. Now let’s see how to use it and, more importantly, why you should consider using it. As I wrote in the previous article, SQL is no match to RPG’s CHAIN. Since I previously showed how to declare the cursor, let’s go over the actual read operations, hidden under the FETCH instruction.
I’m guessing that you’ve asked someone (perhaps even yourself) one or more of these questions.
By Carol Woodbury
I get asked a lot of questions—via email, when I’m presenting at conferences, after my Coffee with Carol article series sponsored by my employer, as well as questions asked in response to these articles, but some questions are asked more often than others. I thought it might be fun to answer the top six most-frequently-asked questions and provide references for additional information. Here we go!
IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small.
This begs the question: How will you manage the platform that supports such a big part of your business?
This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:
- Why IBM i skills depletion is a top concern
- How leading organizations are coping
- Where automation will make the biggest impact
Download your copy today!
The annual Profound Logic ‘State of IBM i Modernization Survey” takes a look at the trends and attitudes that shape the IBM i modernization market. We reached out to the IBM i community, and the response was outstanding: close to 800 people, nearly 300 more than last year, took the survey. This enthusiasm resulted in very interesting findings for how businesses plan to use and modernize the platform in the coming year.
As you read through each section of the survey, you will see our summary of the results and suggestions for the future. We hope the survey will help your business better understand what is possible for your IBM i platform in the coming year.
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
Can you trust all of your users all of the time?
A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six month later.
A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:
- How phishing attacks are becoming more sophisticated
- Three little-known ways malicious programs can reach your IFS
- Why the IFS is IBM i’s “Typhoid Mary”
You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.
The thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
Manage your reports with the Robot Report Management Solution. Key features include:
- Automated report distribution
- View online without delay
- Browser interface to make notes
- Custom retention capabilities
- Seamless product integration
Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.
TRY the one package that solves all your document design and printing challenges on all your platforms.
Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.
- Acquisition positions IBM as the leading hybrid cloud provider and accelerates IBM's high-value business model, extending Red Hat's open source innovation to a broader range of clients
- IBM preserves Red Hat's independence and neutrality; Red Hat will strengthen its existing partnerships to give customers freedom, choice and flexibility
- Red Hat's unwavering commitment to open source remains unchanged
- Together, IBM and Red Hat will deliver next-generation hybrid multicloud platform
IBM and Red Hat announced today that they have closed the transaction under which IBM acquired all of the issued and outstanding common shares of Red Hat for $190.00 per share in cash, representing a total equity value of approximately $34 billion.