IBMChampion Retweets (@IBMCRTWT) retweeted:
– Simon Hutchinson (@RPGPGM)09:33 – Aug 15, 2022
If you have been waiting to use the new release of PowerHA SystemMirror for IBM i 7.5, then we have good news for you: IBM has finally completed the paperwork necessary to enable customers to actually get it.
Unless you have a soft spot in your heart for IBM product IDs and feature codes (we know you’re out there), the August 9 software announcement doesn’t have a whole lot of actionable information. IBM says that it has updated the product “with the necessary product IDs and feature codes to complete the required ordering and upgrade structure,” which is IBM-speak for …
The post IBM Puts The Finishing Touches On PowerHA For IBM i 7.5 appeared first on IT Jungle.
In the first part of this series, I showed how to replace characters in a string using SQL and regular expressions. This time, I’ll show other regular expressions that are available for us to use. The regular expression functions I’ll show are REGEXP_COUNT and REGEXP_LIKE and the examples come from production programs that I’ve recently implemented.
In the first example (Figure 1), I want to get a count of the number of occurrences of a pattern within a string. To make this more interesting, I’m searching for two different patterns within a sting. To accomplish this objective, I used …
If there is one thing that is consistently hard for human beings, it is learning from the experience of others. When it comes to IBM i security, it is safe to say that many IBM i shops are in over their heads and they have to get all of the help they can to try to batten down the hatches against the many threats that all systems – even the IBM i platform – can be the victim of these days.
That’s why IBM i security software vendor Raz-Lee has put together a series of webinars in September to help …
The post Get Your Security Education, And Not From The School Of Hard Knocks appeared first on IT Jungle.