March 1, 2023
March 1, 2023 | Volume 16 Issue 80
- LEAD ARTICLE: SQL 101: DML Recap—Some Handy Column Functions, Part 2
- FEATURED ARTICLE: Creating and Using Files: Data Types and Data Storage
- FEATURED ARTICLE: Penetration Testing - Do you need proof your Exit Point software is working?
- NEWS HIGHLIGHT: Remain Software Releases TD/OMS V14.1, MiWorkplace V1.30 and OCTO 1.0
- FEATURED NEWS: IBM Report: Ransomware Persisted Despite Improved Detection in 2022
- WEBCAST: Low Code: A Digital Transformation of Supply Chain and Logistics
- EVENT: iCON - WMCPA Spring Conference 2023
SQL 101: DML Recap—Some Handy Column Functions, Part 2
The previous TechTip focused on COUNT, MIN, MAX, SUM and AVG—all very useful column functions. However, the last two functions can produce results that are not very user-friendly. This TechTip will help you solve that.
By Rafael Victória-Pereira
Say you have a beautifully crafted SQL statement that returns the average of some complicated operation between columns of a given subset of data. It saved you hours of writing intermediate queries and complicated joins (by the way, here are a couple of refreshers about table joins, if you need them), but the result is most unfortunate: a very long number with loads and loads of decimal places. So what do you do? Rewrite the query to get a “prettier” result? No, there’s a better way: use CAST.
IBM Quantum Computer Demonstrates Next Step Towards Moving Beyond Classical Supercomputing
Programming in ILE RPG - Creating and Using Files: Data Types and Data Storage
You must assign a data type to each column in a table.
By Brian Meyers and Jim Buck
Editor's Note: This article is excerpted from chapter 3 of Programming in ILE RPG, Fifth Edition.
The column’s data type determines how its values are stored, how much storage the column occupies, and what kinds of operations can be performed on the column when it is used within a program. Commonly used data types fall into three general categories:
- Character
- Numeric
- Date
Penetration Testing - Do you need proof your Exit Point software is working?
Or do you need to implement Exit Point software?
By DXR Security, LLC.
Many organizations have implemented exit point software but are wondering whether the rules they’ve implemented are working as they expect. Other organizations have purchased exit point software but have only implemented it in ‘watch mode’ and wonder about the benefits of implementing rules. Finally, some organizations are contemplating a software purchase but aren’t sure it’s worth the time and effort and need proof of the benefits prior to purchasing. Regardless of which situation you find yourself in, Penetration Testing for IBM i can help answer your question.
Why Migrate When You Can Modernize?
Explore the main considerations you should be aware of before embarking on a (migration or modernization) project. Take a deeper dive into business motivations and factors that could potentially influence your decision to migrate or modernize your existing IT platform and its risks.
More than ever, there is a demand for IT to deliver innovation.
Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.
Node Webinar Series Pt. 1: The World of Node.js on IBM i
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
watch now!
Low Code: A Digital Transformation of Supply Chain and Logistics
Learn how businesses leverage Low-Code to continue to deliver value through digital transformation. Discover how the power of Low-Code is helping many businesses evolve their supply chain, increase ROI, and achieve more tangible results.
Watch this webcast now.
Easiest Way to Save Money? Stop Printing IBM i Reports
The thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
Manage your reports with the Robot Report Management Solution.
Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.
Comply in 5! Well, actually UNDER 5 minutes!!
TRY the one package that solves all your document design and printing challenges on all your platforms.
Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.
IBM Report: Ransomware Persisted Despite Improved Detection in 2022
IBM Security today released its annual X-Force Threat Intelligence Index finding that although ransomware's share of incidents declined only slightly (4 percentage points) from 2021 to 2022, defenders were more successful detecting and preventing ransomware. Despite this, attackers continued to innovate with the report showing the average time to complete a ransomware attack dropped from 2 months down to less than 4 days.
By IBM Corporation
According to the 2023 report, the deployment of backdoors, which allow remote access to systems, emerged as the top action by attackers last year. About 67% of those backdoor cases related to ransomware attempts, where defenders were able to detect the backdoor before ransomware was deployed. The uptick in backdoor deployments can be partially attributed to their high market value. X-Force observed threat actors selling existing backdoor access for as much as $10,000, compared to stolen credit card data, which can sell for less than $10 today.