fhg
Volume 15, Number 18 -- September 15, 2015
Sponsored By
PRODATA COMPUTER SERVICES

ProData Software Suite

ProData software gives developers and super users secure access to data regardless of where that data is housed.

DBU, RDB Connect and SQL/Pro provide the functions to zero in on the data YOU need NOW.

Download today!
www.DoDBU.com
800.228.6318


Sponsored By
CCSS

How to Save A Million Dollars with Job Monitoring

When rogue IBM i jobs spend their time looping, devouring CPU, or simply becoming inactive, the consequences are immediate and measurable--unproductive users, financial penalties, and time wasted searching the system for the culprit.

With proactive monitoring and real-time alerts, you can prevent time-consuming investigations and costly dips in productivity.

Read this best practice guide to learn more


A First Look At SQL Descriptors
by Paul Tuohy

SQL descriptors allow for incredible flexibility when it comes to constructing dynamic SQL statements and/or processing the results of a dynamic SQL statement. But, since this is an introduction, let's look at how they can be used in constructing dynamic SQL statements and leave their use in processing results for a later article. READ MORE >

Another Reason To Use Unrequired Correlation Names
by Ted Holt

Almost eight years ago I gave you two good reasons to use a correlation name when SQL did not require one. A recent experience revealed to me another good reason to use an unnecessary correlation name, and I am happy to be able to share that information with you today! READ MORE >

Sponsored By
WORKSRIGHT SOFTWARE

Do you need area codes?
Do you need ZIP Codes?
Do you need ZIP+4?
Do you need city or county names?
Do you need a dealer locator system?

We can HELP!
We have affordable AS/400 software
and data to do all of the above.
Call us for 30 days FREE.

WorksRight Software, Inc.
Phone: 601-856-8337
Fax: 601-856-9432
E-mail: software@worksright.com
Web site: www.worksright.com



RCAC In DB2 For i, Part 3: Advanced Topics
by Michael Sansoterra

In Part 1 and Part 2 of this RCAC series, I covered row and column access control (RCAC) row permissions and column masks, and demonstrated how they can be used to add an additional layer of security to your DB2 for i database without necessarily having to change legacy applications. This tip will explore the RCAC topic a little further by discussing a few advanced concepts that may affect your implementation of RCAC. READ MORE >



Reader Feedback and Insights

We value your feedback and insights.  Feel free to send a letter to the editor.  Letters may be printed, unless otherwise specified, and edited for clarity or length. READ MORE >


 
Senior Technical Editor: Ted Holt
Technical Editor: Joe Hertvik
Contributing Technical Editors: Edwin Earley, Brian Kelly, Michael Sansoterra
Publisher and Advertising Director: Jenny Thomas
Advertising Sales Representative: Kim Reed
Contact the Editors: To contact anyone on the IT Jungle Team
Go to our contacts page and send us a message.

Sponsored Links

ProData Computer Services:  Zero in on the data YOU need NOW with DBU, RDB Connect and SQL/Pro.
Four Hundred Monitor Calendar:  Latest info on national conferences, local events, & Webinars.
System i Developer:  Session Grid Posted: RPG & DB2 Summit - Chicago, October 20-22

 

The Four Hundred
Taking The Power Systems Pulse With GM Doug Balog

IBM i Marketplace Survey: The Importance Of Being Earnest

Assignment IBM i: What Makes It Tick?

RPG Certification And Coursework Nears Completion

Reader Feedback On A Hypothetical Future IBM i System

Four Hundred Monitor
Four Hundred Monitor's
Full iSeries Events Calendar

System i PTF Guide
September 12, 2015: Volume 17, Number 37

September 5, 2015: Volume 17, Number 36

August 29, 2015: Volume 17, Number 35

August 22, 2015: Volume 17, Number 34

August 15, 2015: Volume 17, Number 33

August 1, 2015: Volume 17, Number 31

The Platform
Airbnb Shares The Keys To Its Infrastructure

Toolset Expands for GPU Accelerated Java Development

Spark Makes Hadoop Mainstream, Cloudera Jumps In

Intel's Plan To Grow Its Share Of Datacenter Wallets

How Can IBM Power8 Win Deals Away From Intel Xeon?

Google Refines Cloud Pricing Around Capacity Lessons

Google, Cycle Computing Pair for Broad Genomics Effort

Matching Xeon Phi Performance to Genomic Analysis

The Black Box Problem Closes in on Neural Networks

The Nitty Gritty Of In Memory Computing

Custom Servers Cool, Custom Storage White Hot

Is Quantum Computing Set For An Investment Boom?


THIS ISSUE SPONSORED BY:

ProData Computer Services
CCSS
WorksRight Software


TABLE OF CONTENTS
A First Look At SQL Descriptors

Another Reason To Use Unrequired Correlation Names

RCAC In DB2 For i, Part 3: Advanced Topics


Four Hundred Guru

BACK ISSUES




 
Subscription Information:
You can unsubscribe, change your email address, or sign up for any of IT Jungle's free e-newsletters through our Web site at http://www.itjungle.com/sub/subscribe.html.

Copyright © 1996-2015 Guild Companies, Inc. All Rights Reserved.
Guild Companies, Inc., 50 Park Terrace East, Suite 8F, New York, NY 10034

Privacy Statement