How Easy Is It Really to Code on Visual LANSA? John Scott

​[[{“value”:”In today’s fast-paced development world, efficiency and ease of coding are key. Yet, developers often juggle multiple languages, frameworks, and environments just to build one application. Managing separate tools for front-end, back-end, and databases adds complexity, increases integration risks, and slows deployment. Visual LANSA simplifies this process with an all-in-one IDE that handles everything from
The post How Easy Is It Really to Code on Visual LANSA? appeared first on .”}]] Read More 

MTI_INFO now includes member name [email protected] (Simon Hutchinson)

​[[{“value”:”As part of the latest round of Technology Refreshes, IBM i 7.5 TR5 and 7.4 TR11, the MTI_INFO Table function was enhanced with the addition of the member or Table partition name the MTI was created over. I have to admit I was surprised this was not included when the Table function was first introduced.
The new column is called TABLE_PARTITION, it is the third column in the results, and is a VARCHAR of a maximum of 128 characters.
If I just wanted to view all of the MTIs in my partition I would use the following statement:

01 SELECT TABLE_SCHEMA,TABLE_NAME,FILE_NAME,
02 TABLE_PARTITION
03 FROM TABLE(QSYS2.MTI_INFO())
04 ORDER BY 1,2
05 LIMIT 5

Read more »”}]] Read More 

Started to work with spaghetti code holz093

​[[{“value”:”On the other side the company has started to replace the system and they wanna move away from ibm i even though it makes the most sense for them as they mainly process online transactions (its a wms).
Hi guys, I started a couple of months ago at a company with 1 Billion revenue and they are using ibm i as running system.”}]] Read More 

Be Afraid: IBM i Security Vulnerabilities in Today’s Connected World Eradani

​Step into the hidden world of IBM i security vulnerabilities and discover why traditional approaches are leaving your mission-critical systems exposed in today’s interconnected landscape. This eye-opening, demo-driven session reveals common security gaps and shows exactly how modern threats can compromise systems using basic authentication and native IBM i credentials. Watch as we demonstrate real-world security vulnerabilities and showcase how modern security approaches can protect your valuable business systems. Read More 

Verified by MonsterInsights