In August I wrote about a new way to get data from another partition using the three part name with the new REMOTE TABLE. I said that I did not know of another way to get data from a Table function using the three part name.
I received an answer from IBM Db2 for i member Sue Romano with an example of how to do it for older releases. The example she gave she used the WHERE EXISTS clause with the three part name in it.
I use the three part name to get all kinds of information from other partitions, and in this example I will be giving a couple of examples:
Read more » Read More
Common: iSee Who is Messing With Environment Variables learn.common.org
COMMON, IBM, Tim Rowe, Scott Forstie, IBM i, Environment Variables, security, variable changes Read More
Four Hundred Monitor, December 6 Jenny Thomas
As one year comes to a close, it’s natural to look ahead with anticipation of what the new one will bring. No matter your age, there’s something about rolling over the calendar that makes us take stock of our lives, reset goals, and make a plan for the year ahead. That applies to companies, too. For instance, one of the oldest names in computing is hoping to shape the future of, well, everything. Yes, our very own IBM is making big moves in quantum computing and AI that it hopes will pay off big in the new year, as you …
The post Four Hundred Monitor, December 6 appeared first on IT Jungle. Read More
Government Cracks Down on Security Reponses, Unpatched Vulns Alex Woodie
New federal rules that go into effect next week require public companies to share information about past security incidents within four days of the event, as well as detail in annual reports how they’re preparing for future attacks. And a state prosecutor in New York fined a company for allowing hackers to steal customer data through a critical zero-day security vulnerability that was left unpatched for 11 months.
The Securities and Exchange Commission (SEC)’s new cybersecurity rule that went into effect on October 1 requires public companies to report details of cybersecurity incidents that impact their operations. Companies must report …
The post Government Cracks Down on Security Reponses, Unpatched Vulns appeared first on IT Jungle. Read More
AWS Taps Precisely to Bring IBM i Data Into Its Cloud Alex Woodie
Amazon Web Services and Precisely have entered into a partnership agreement that will see AWS reselling Precisely’s data replication software to bring IBM i data into the cloud. It’s part of a larger effort by AWS to bring more IBM workloads into its data centers.
Precisely and AWS previously had a relationship to move mainframe data into the world’s largest public cloud through a program called AWS Mainframe Modernization Data Replication. In late November, the companies announced they’re expanding the program to include IBM i. (While not technically a mainframe, the IBM i server is often called a mainframe. If …
The post AWS Taps Precisely to Bring IBM i Data Into Its Cloud appeared first on IT Jungle. Read More