October 11, 2019
- LEAD ARTICLE: SQL 101: Ultra-Flexible Cursors—The Beauty of PREPARE
- FEATURED ARTICLE: Has My IBM i Been Breached?
- FEATURED WEBINAR : How to Meet the Newest Encryption Requirements on IBM i
- NEWS HIGHLIGHT: IBM Ranked the Worldwide Market Share Leader in Artificial Intelligence for Third Consecutive Year
- WEBCAST: Node Webinar Series Pt. 1: The World of Node.js on IBM i
- MC VIDEO SHOWCASE: Design an Invoice in 10 Minutes
- EVENT: Give your RPG applications the UI they deserve
SQL’s PREPARE statement, combined with ILE RPG, can bring unmatched flexibility to your application’s code. Read on to find how you can do it. It’s easier than you think!
By Rafael Victória-Pereira
Using thePREPARE SQL instruction, you can have a single cursor and use it according to conditions defined by user input, for instance. I’ve seen subfiles with different columns, selections, and sorting being managed with a single cursor. How, you might ask? The PREPARESQL instruction allows you to define a cursor loosely:
Carol provides tips for what to examine to help determine if your system’s been breached.
By Carol Woodbury
This discussion stems from a conversation I had with a friend who asked what information is available on IBM i to help an organization determine whether they had been breached. These tips are not meant to be a replacement for a formal breach investigation service. In fact, I highly recommend that you develop an incident response plan and consider putting an outside firm on retainer in the event you’re breached. The information I provide here needs to be a part of a larger plan but may be helpful in determining whether you need to call in outside resources for further analysis...or help you come to the conclusion that nothing happened.
Explore the main considerations you should be aware of before embarking on a (migration or modernization) project. Take a deeper dive into business motivations and factors that could potentially influence your decision to migrate or modernize your existing IT platform and its risks.
More than ever, there is a demand for IT to deliver innovation.
Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
Learn how businesses leverage Low-Code to continue to deliver value through digital transformation. Discover how the power of Low-Code is helping many businesses evolve their supply chain, increase ROI, and achieve more tangible results.
Watch this webcast now.
The thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
Manage your reports with the Robot Report Management Solution.
Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.
TRY the one package that solves all your document design and printing challenges on all your platforms.
Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.
A growing number of compliance mandates require sensitive data to be encrypted, from the EU’s GDPR to New York’s cybersecurity law. PCI DSS goes a step further by detailing how encryption keys must be stored.
Editor's note: This article introduces the September 2019 Webinar: How to Meet the Newest Encryption Requirements on IBM i, which is On-Demand and available to download and view from the MC Webcast Center.
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity.