Article Andreas Dieckow · Apr 7, 2016 1m read

Presenter: Andreas Dieckow
Task: Apply SQL security to multiple servers in a distributed system
Approach: Provide code samples for using new API calls to apply SQL security statements to multiple instances of our products
 

Description: The requirement that started at all. See examples on how to use this new feature and integrate it into your application by discuss code examples.

Problem: SQL Security is local to the instance and most of time driven by customer application code. That it is only local to the instance and is not automatically going to other instances requires a solution.

Solution: With application code use new API calls to issue SQL security statements that is applied to multiple instances.

Content related to this session, including slides, video and additional learning content can be found here.

1
0 274
Article Joe Gallant · Apr 8, 2016 1m read

Presenter: Joe Gallant
Task: Create a good analytical data model
Approach: Discuss what makes a good analytical data model. Provide examples of using DeepSee’s APIs for building custom dimensions, measures, and KPIs
 

Data models are the foundation of effective analytics. This session focuses on the factors that make good analytics data models. 

Content related to this session, including slides, video and additional learning content can be found here.

1
0 283
Question Stephen Canzano · Apr 13, 2016

I interested on how others feel on this subject.  In general terms when you have a class that extends from %XML.Adaptor and you call XMLExport no validation is automatically done as part of the XMLExport process.  As an example if you do the following

SAMPLES>S tPatient=##Class(Sample.Person).%New()
 
SAMPLES>Set tPatient.Name="asdfghjklqwrrrrokkfkljbvkfbjflkbjflkbjblkjblkjdblkjblkcn l nn klkjdfkbjdlkbjlkbj"
SAMPLES>w tPatient.XMLExport(,",indent")
<Person>
  <Name>asdfghjklqwrrrrokkfkljbvkfbjflkbjflkbjblkjblkjdblkjblkcn l nn klkjdfkbjdlkbjlkbj</Name>
</Person>

where tPatient.Name has a value which

3
0 832
Question Steve Shaw · Apr 14, 2016

Hi,

IHAC who is trying to connect Ensemble to Quadramed for HL7 messaging, however, it seems that in order to do this, the following is required:

"we open a passive connection to Quadramed and then listen for a connection request from Quadramed, once this is established we then send messages"

Has anyone done this before?  Is this possible with the standard HL7 components?

Thanks,

Steve.

1
0 451
Article Paul Gomez · Apr 8, 2016 1m read

Release Notes - 4/8/2016

Release Notes - Developer Community (External) - Version DCWeb-040816-Release

** Task
    * [DCE-113] - Remove Content Type "Code Package"
    * [DCE-115] - Add DC members mentioning functionality
    * [DCE-116] - Fix layout on Global Summit landing page
    * [DCE-118] - Tag appropriate content as "New" 
    * [DCE-123] - Change "Newest" filter rules
 ** Bug
    * [DCE-114] - Adding comment to Answer should mark parent posting as updated
    * [DCE-117] - Home page duplicates postings when more than one group selected
    * [DCE-119] - Search results showing raw answer name
   

5
0 327
Article Timothy Leavitt · Apr 11, 2016 1m read

In the subscriptions e-mails I get (digested), the URLs are typically wrapped across lines, like:

| Post link:

| 

|http://community.intersystems.com/post/explanation-defaultdb-database-2

|01610  Direct unsubscribe link (content type):

My mail client can't handle this, of course; the link doesn't work. (The actual link in this case is: https://community.intersystems.com/post/explanation-defaultdb-database-… )

6
0 315
Announcement Francis Galiegue · Apr 6, 2016

Hello community!

Two new rules have been implemented:

OS0061: unsafe namespace switch

This rule detects when the body of a method contains two or more of the following statements:

  • set $namespace = something, or
  • znspace something.

If this is the case, it then checks whether there is a new $namespace prior to those two declarations; if not, it raises a warning.

List of issues currently found here:

https://demo.cachequality.com/issues/search#severities=CRITICAL|rules=cachequality%3AOS0061|resolved=false

OS0062: confusing identifiers

This rule detects whether either of a method argument, or a local variable

8
0 579
Article Francis Galiegue · Apr 10, 2016 1m read

Hello!

Link: https://demo.cachequality.com

In this presentation, developer oriented, we will cover this tool, how it works, how you can use it/administer it, etc. Duration 30 minutes.

The topics will include:

  • a short presentation of Caché Quality and SonarQube (which this plugin uses),
  • a demonstration of the rules and how to tailor them to your need.

Questions will be more than welcome! Hope to see you there!

And a big thanks to Evgeny Shvarov who made this possible!

0
0 684
Question Eduard Lebedyuk · Apr 10, 2016

Here's my code (download):

Class Utils.Generators [ Abstract ]
{

ClassMethod B()
{
    s ^a = 1
}

ClassMethod A() [ CodeMode = objectgenerator, GenerateAfter = B, PlaceAfter = B ]
{
    k ^a
    do ..B()
}

Now, obviously for it to work I need method B compiled and ready to use before compiling method A().

I test it with the following code:

do $system.OBJ.UnCompile("Utils.Generator")
do $system.OBJ.Compile("Utils.Generator")

Yet, I receive the following compilation error:

Compilation started on 04/10/2016 18:39:04 with qualifiers ''
Compiling class Utils.Generator
2
0 1020
Article Steve Glassman · Apr 8, 2016 1m read

I am pleased to announce the next 2016.2 field test kit, 2016.2.0.632.0.

Since I haven’t sent an update to this thread in a while it should come as no surprise that there have been quite a few changes since I wrote about build 609.  In fact, there have been over 175 changes in 50 different areas, with the majority of changes in:

  • Atelier
  • DOCUMENT Data Model
  • SQL
  • DeepSee

The most changes since build 609 are in Atelier and the biggest Atelier change is that the Atelier client is no longer bundled with the field test kit.  The latest Atelier client is available HERE.

The accumulated list of fixes to probl

1
0 386
Article Boris Mamkin · Apr 8, 2016 1m read

Presenter: Boris Mamkin
Task: Understand and use CDA in HealthShare
Approach: Provide a real-world example of how the Clinical Document Architecture standard is being used in a clinical integration
 

In this session, we will discuss the basics of using CDA in HealthShare, as well as a real world example of how CDA is being used in a clinical integration.

Content related to this session, including slides, video and additional learning content can be found here. Please note that this content is available only to HealthShare customers and attendees of the Global Summit. On the learning web site you will be prompted for your Global Summit credentials to access this content.

0
0 378
Article Alex MacLeod · Apr 8, 2016 1m read

Presenter: Alex MacLeod
Task: Understand and use IHE in HealthShare
Approach: Provide a real-world example of a successful IHE implementation
 

In this session, we will discuss the basics of IHE in HealthShare, as well as share a real world example of a successful IHE implementation.

Content related to this session, including slides, video and additional learning content can be found here. Please note that this content is available only to HealthShare customers and attendees of the Global Summit. On the learning web site you will be prompted for your Global Summit credentials to access this content.

0
0 379
Article Benjamin De Boe · Apr 8, 2016 1m read

Presenter: Benjamin De Boe
Task: Extract specialized information from your unstructured data
Approach: Combine InterSystems iKnow technology with third-party and custom text-processing tools
 

This session explains how you can easily combine ISC, third-party and custom text processing tools to get the broadest insights in your unstructured data.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 427
Article Jacquelyn Gentile · Apr 8, 2016 1m read

Presenter: Dirk Van Hyfte
Task: Leverage unstructured data to improve how clinicians deliver care
Approach: Give real-world examples of organizations that are benefiting from using their unstructured data
 

This session will feature real-world examples of how healthcare organizations can benefit from exposing unstructured data to clinicians at point-of-care as well as to clinical informatics building predictive models. Presenters are Wesley Williams, PhD, Vice President and Chief Information Officer, Mental Health Center of Denver; Augie Turano PhD. IT Director Veterans Informatics and Computer Infrastructure (VINCI); and Dirk Van Hyfte, MD, PhD, Senior Research Consultant.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 352
Article Barry Cooper · Apr 8, 2016 1m read

Presenter: Barry Cooper
Task: Enable users to perform analytics within an application and take actions based on those analytics
Approach: Provide examples of embedding DeepSee within applications
 

Analytics is more than just using data to provide insight. Analytics is about taking action on that insight. See examples of how you can embed DeepSee in your applications, allowing you to take action.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 194
Article Andre Cerri · Apr 8, 2016 1m read

Presenter: André Cerri
Task: Use third-party visualization tools to present your DeepSee data
Approach: Use DeepSee REST services to access DeepSee data from third-party tools
 

Come see examples of how you can use popular 3rd party data visualization tools to access your DeepSee data.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 297
Article Saurav Gupta · Apr 8, 2016 1m read

Presenter: Saurav Gupta
Task: Provide customized authentication support for biometrics, smart cards, etc.
Approach: Provide code samples and concept examples to illustrate various custom authentication mechanisms
 

Description: In this session we will discuss customized way to solve various authentication mechanism and show case some sample code.

Problem: Using custom Authentication mechanism to support devices like biometrics, smart cards, or create an authentication front end for existing applications.

Solution: Code samples and concept examples.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 337
Article Benjamin De Boe · Apr 8, 2016 1m read

Presenter: Benjamin De Boe
Task: Perform advanced analytics on huge amounts of data
Approach: Use third-party analytics frameworks to leverage your entire clustered environment
 

In this session, we’ll explain what machine learning means and how it can help you gain insights in vast amounts of data, leveraging complex environments.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 309
Article Paul Gomez · Apr 8, 2016 1m read

In this release we added new functionality that marks postings with either a "new" icon or an "unread" icon depending on when you came to the site last and the age of the postings.

Here are the rules as currently implemented:

- If a user hasn't viewed content which was posted less than 2 weeks ago, then the label "new" is displayed.

- If the user hasn't viewed content which was posted more than 2 weeks ago then the label "unread" is display.
 

0
0 278
Article Harry Tong · Apr 7, 2016 1m read

Presenter: Harry Tong
Task: Load terabytes of data into a distributed environment
Approach: Leverage parallelism and open-source tools
 

In this session, we’ll discuss how to load TBs of data into a distributed environment, leveraging parallelism and open source to reach exceptional load rates.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 371
Article Anton Umnikov · Apr 7, 2016 1m read

Presenter: Anton Umnikov
Task: Run SQL queries quickly on huge amounts of data
Approach: Use a shared-nothing architecture to leverage a cluster of small, cost-effective servers
 

Explains how a shared nothing architecture allows you to leverage a cluster of small, costeffective servers to serve query results that would have taken much longer on a single, big and expensive box. This brings affordable horizontal scalability.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 387
Article Tony Pepper · Apr 7, 2016 1m read

Presenter: Tony Pepper
Task: Host an application based on InterSystems’ technology in a public cloud environment
Approach: Provide a checklist of things to think about before you deploy
 

Are you looking at hosting your applications in the public cloud? This talk will highlight what you need to think about when deploying InterSystems technology in any public cloud environment.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 237
Article Jacquelyn Gentile · Apr 7, 2016 1m read

Presenter: Maxim Vershinin
Task: Easily extend your solution’s range of interoperability
Approach: Build Java-only business services and business operations that exploit open-source Java libraries
 

Problem: The title states the problem Open source java libraries exist for hundreds of protocols and formats. This session explains how you can easily build java only Business Services and Business Operations to that exploit these libraries to extend the range of interoperability.

Content related to this session, including slides, video and additional learning content can be found here.

0
0 362
Article Mark Bolinsky · Apr 7, 2016 1m read

Presenter: Mark Bolinsky
Task: Provide failover for distributed systems without using a VIP
Approach: Demonstrate using InterSystems’ database mirroring with external traffic managers such as F5 LTM/GTM
 

With distributed environments and even public cloud environments, the use of a VIP sometimes is not desirable or even possible given network topology or deployment. The session will demonstrate integrating database mirroring with external traffic managers such F5 LTM/GTM using API based triggers in InterSystems products to interface with the F5 appliances. This not only presents automated redirection for the local mirror members, but also provided automated client redirection to asynchronous DR mirror members. 

Content related to this session, including slides, video and additional learning content can be found here.

0
0 504