March 1, 2023

MC RPG Developer

Lead Article - Programming

SQL 101: DML Recap—Some Handy Column Functions, Part 2

The previous TechTip focused on COUNT, MIN, MAX, SUM and AVG—all very useful column functions. However, the last two functions can produce results that are not very user-friendly. This TechTip will help you solve that.

By Rafael Victória-Pereira

Say you have a beautifully crafted SQL statement that returns the average of some complicated operation between columns of a given subset of data. It saved you hours of writing intermediate queries and complicated joins (by the way, here are a couple of refreshers about table joins, if you need them), but the result is most unfortunate: a very long number with loads and loads of decimal places. So what do you do? Rewrite the query to get a “prettier” result? No, there’s a better way: use CAST.

Feature Article - Programming

Programming in ILE RPG - Creating and Using Files: Data Types and Data Storage

You must assign a data type to each column in a table. 

By Brian Meyers and Jim Buck

Editor's Note: This article is excerpted from chapter 3 of Programming in ILE RPG, Fifth Edition.

The column’s data type determines how its values are stored, how much storage the column occupies, and what kinds of operations can be performed on the column when it is used within a program. Commonly used data types fall into three general categories:

  • Character
  • Numeric
  • Date
IBM i Security

Penetration Testing - Do you need proof your Exit Point software is working?

Or do you need to implement Exit Point software?

By DXR Security, LLC.

Many organizations have implemented exit point software but are wondering whether the rules they’ve implemented are working as they expect. Other organizations have purchased exit point software but have only implemented it in ‘watch mode’ and wonder about the benefits of implementing rules. Finally, some organizations are contemplating a software purchase but aren’t sure it’s worth the time and effort and need proof of the benefits prior to purchasing. Regardless of which situation you find yourself in, Penetration Testing for IBM i can help answer your question. 

White Papers

SB LANSA PPL 5650

Why Migrate When You Can Modernize?

Explore the main considerations you should be aware of before embarking on a (migration or modernization) project. Take a deeper dive into business motivations and factors that could potentially influence your decision to migrate or modernize your existing IT platform and its risks.

Download your copy today!

Element Break 210x14

Profound WP PPL newsletter logo 5562

Profound Logic Solution Guide

More than ever, there is a demand for IT to deliver innovation.

Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.

The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

Get your copy of this important guide today!

Element Break 210x14

Webcast

Profound WC PPL newsletter logo v1

Node Webinar Series Pt. 1: The World of Node.js on IBM i

Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.

In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).



watch now!

Element Break 210x14

LANSA Webcast

Low Code: A Digital Transformation of Supply Chain and Logistics

Learn how businesses leverage Low-Code to continue to deliver value through digital transformation. Discover how the power of Low-Code is helping many businesses evolve their supply chain, increase ROI, and achieve more tangible results.

Watch this webcast now.

Element Break 210x14

 

Trial Software

HelpSystems SC PPL newsletter logo

Easiest Way to Save Money? Stop Printing IBM i Reports

The thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.

Manage your reports with the Robot Report Management Solution.

Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

Request your trial now!

Element Break 210x14

Cybra SC PPL newsletter logo v1

Comply in 5! Well, actually UNDER 5 minutes!!

TRY the one package that solves all your document design and printing challenges on all your platforms.

Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

Request your trial now!

Element Break 210x14

Featured News

IBM Report: Ransomware Persisted Despite Improved Detection in 2022

IBM Security today released its annual X-Force Threat Intelligence Index finding that although ransomware's share of incidents declined only slightly (4 percentage points) from 2021 to 2022, defenders were more successful detecting and preventing ransomware. Despite this, attackers continued to innovate with the report showing the average time to complete a ransomware attack dropped from 2 months down to less than 4 days.

By IBM Corporation

According to the 2023 report, the deployment of backdoors, which allow remote access to systems, emerged as the top action by attackers last year. About 67% of those backdoor cases related to ransomware attempts, where defenders were able to detect the backdoor before ransomware was deployed. The uptick in backdoor deployments can be partially attributed to their high market value. X-Force observed threat actors selling existing backdoor access for as much as $10,000, compared to stolen credit card data, which can sell for less than $10 today.

Upcoming Events
MC Press Bookstore