• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Guru: Regular Expressions, Part 2

    August 15, 2022 Mike Larsen

    In the first part of this series, I showed how to replace characters in a string using SQL and regular expressions. This time, I’ll show other regular expressions that are available for us to use. The regular expression functions I’ll show are REGEXP_COUNT and REGEXP_LIKE and the examples come from production programs that I’ve recently implemented.

    In the first example (Figure 1), I want to get a count of the number of occurrences of a pattern within a string. To make this more interesting, I’m searching for two different patterns within a sting. To accomplish this objective, I used …

    Read more
  • Guru: IBM i Privileged Account Management, And What’s So Special About Special Authorities

    August 1, 2022 Bruce Bading

    Privileged Account Management (PAM) is a keystone of cybersecurity. Everywhere we look PAM is a hot topic. How and why should we worry about it? IBM, Ponemon, Verizon, etc., tell you that it is vitally important to protect your endpoints from cyberattacks and insider threats. While the Verizon DBIR states that external threats account for 80 percent of security incidents, it points out their findings that show otherwise for incidents resulting in data compromise where the insider threat exceeded that of an outsider by more than 10 to one. Simply put by Verizon, “This supports the principle that …

    Read more
  • Guru: Regular Expressions, Part 1

    July 25, 2022 Mike Larsen

    In the first part of this series, I will show how to replace characters in a string using SQL and regular expressions. I know I can replace characters using RPG or SQL, and they work great, but there are some cases where I find using regular expressions is a bit easier.

    For the examples I’ll show, I’m using the REGEXP_REPLACE function. REGEXP_REPLACE allows me to search for a particular value within a string and replace it with another value.

    In the first example (Figure 1), I want to search a string that has both letters and digits and I want …

    Read more
  • Guru: IBM i Experience Sharing, Case 5 – Using IBM i PDI Charts To Answer Performance Questions

    July 18, 2022 Satid Singkorapoom

    During my long career as an IBM i performance specialist, it was natural for people to ask me performance-related questions of various kinds. But in many cases, it seemed to me that the customer could not understand my answers, and I could not provide supporting evidence due to the lack of a performance reporting tool that could produce easy-to-understand explanatory information. The situation changed for the better with the availability of IBM i Performance Data Investigator (PDI) tool as of release 6.1. I would say that the PDI tool provides charts of information that resemble those used by business people …

    Read more
  • Reader Feedback On Guru: The Finer Points of Exit Points

    July 12, 2022 Bruce Bading

    Hey, Alex:

    Hope you are doing well. I was reading this article about exit points and found some technical inaccuracies.

    The Socket Exit can be used to cover the following: You can use exits block all unwanted ports blocked. I will be happy to talk with author of this article to explain how this works.

    • Not all services have exit points available.
    • User defined ports do not have exit points associated.

    Best regards,

    — Tony Perera, Trinity Guard, a division of Fresche Solutions


    Hey, one and all:

    As the article states, exit points are an enhancement to cybersecurity on the …

    Read more
  • Guru: The Finer Points of Exit Points

    June 27, 2022 Bruce Bading

    Many years ago, we received a call from an IBM i customer stating that all exit points were gone and the QAUDJRN and receivers were missing. Then the question, “Do you think we’ve been hacked?” Truth was, the exit points weren’t gone; the associated programs had been de-registered. Conclusion, they had most likely been compromised.

    The IBM i platform is a very securable system that can be secured (Secure vs Secured – What’s the difference?, WikiDiff), if you take steps to secure it.

    On the IBM i, a limited number of functions provide an exit so that your …

    Read more
  • Guru: The CALL I’ve Been Waiting For

    June 20, 2022 Ted Holt

    Christmas came to my house early this year. May 3, to be exact. Boy! Was Santa Claus good to me! IBM gave me two presents! The first was a CL enhancement that I had desired for years. The second was an improvement that, to my delight, almost obsoletes a utility I wrote years ago. Both have to do with the CL CALL command.

    CALL is arguably the most used and most important command in CL, yet for all these years it has remained untouched. I’m glad that IBM has seen fit to devote time and resources to the enhancement of …

    Read more
  • Guru: IBM i Experience Sharing Case 4 – Investigating Time-Sensitive Transaction Issues

    June 6, 2022 Satid Singkorapoom

    Among the central processing hardware resources in a computer system – CPU, GPU, memory, disk, PCI-Express I/O bus – disk has always been the slowest component. Even the latest flash disk or NVM-Express flash drive or card is slowest, but not by much. Back in the days of hard disk, disk I/O was the most popular cause of performance problems. From experience, I always looked at it first in my investigation.

    The modern SAN flash disk can still be the performance bottleneck when it is not deployed properly, as I shared in Guru: IBM i Experience Sharing, Case 3 – …

    Read more
  • Guru: IBM i *USRPRF Security

    May 23, 2022 Bruce Bading

    IBM i has long enjoyed a reputation of being one of the most securable application servers in the industry. IBM i object encapsulation or object-oriented architecture achieves a level of technology integrity not found in file-based systems such as Unix, Linux, and Windows – as long as QSECUTY is set to 40 or 50.

    This advanced technology however does not exclude the IBM i from security risks if your development teams are not practicing (DevSecOps | CSRC (nist.gov)) and (Zero Trust Architecture | NIST).

    Let me remind what one of the lead signatories on the Agile …

    Read more
  • Guru: IBM i Unauthenticated Access

    April 25, 2022 Bruce Bading

    One of the greatest threats to any network, host, or server is unauthenticated access where an attacker can gain local or remote access with no credentials that can lead to a Critical rating with the following descriptions (CVSS v3.1 User Guide (first.org).

    Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)

    Integrity Impact Complete (There is a total compromise of system integrity, and a complete loss of system protection resulting in the entire system being compromised.)

    Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle