All time
InterSystems Developer Community is a community of 23,288 amazing developers
We're a place where InterSystems IRIS programmers learn and share, stay up-to-date, grow together and have fun!

Hi Community!

The new video from Global Summit 2019 is already on InterSystems Developers YouTube:

A Skeptics Guide to Containers

https://www.youtube.com/embed/S1E88B-sFcY
[This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]

0 0
0 306

I have been tasked with setting up outage notifications to my group (for example, sending an email or automatically generating a problem incident when HealthShare/Ensemble experiences an outage), and determining outage statistics (for example, the time frame when HealthShare/Ensemble was unavailable). I admit I am having a hard time even defining what should be considered an “outage”.

0 1
0 305

I just used Help\Check for Updates and updated my Atelier from 1.0.158 to 1.0.165. Is there any information published about what's new/fixed in this compared to previous public builds? Having that information might help us target our testing and so increase the value of our feedback to you.

4 1
0 305

Hello,

So i want to use the INSERT OR UPDATE command so i can update a COUNTER for a given name:

INSERT OR UPDATE myTable
SET name='Omer', counter = counter + 1;


as you can see with the above code - if the row is non-existent then we get an error because COUNTER is NULL!
I tried the following to fix this but all have failed:

3 26
0 279

In the previous article we presented the d[IA]gnosis application developed to support the coding of diagnoses in ICD-10. In this article we will see how InterSystems IRIS for Health provides us with the necessary tools for the generation of vectors from the ICD-10 code list using a pre-trained language model, its storage and the subsequent search for similarities on all these generated vectors.

6 1
1 285

Hello,

I have my server setup a resource server. When a user calls our API they submit a bearer token as authorization and in our dispatch class AccessCheck() we validate the JWT using ##class(%SYS.OAuth2.Validation).ValidateJWT().

If I include a scope to check in that method I get the error Scope check may only be done on requesting client and I'm not sure what this means. The method works without include the scope and will let me know if I have an unsigned token or an expired token.

0 5
0 300
Question
· Mar 3, 2024
base64 data to pdf

hi there , when i convert a pdf to base64 data, and then restore the data to pdf,i find that ,i must read the same as length of base64 data every time convert ,or i can't get the right pdf. the code is:

1 3
0 302

The ideal number of table permissions to assign for your users is zero. Permissions should be granted upon sign-in based on the application used for access. For web applications, we have a simple way of doing this by appointing application roles, matching roles, and required resources in the System Management Portal.

ODBC and JDBC connections present a different problem, however, especially when third-party applications are involved. As providers of an ERP system, our customers often wish to be able to employ various software packages to integrate with or report on their data. Many of these programs are capable of running any kind of query. Yet, letting them do that can be devastating to a customer’s data.

3 0
3 305

Hi,

Our application needs to create system users from a request form.

To use Security classes, it is necessary to have rights to use the %SYS namespace, which is not the case for users who validate requests.

It is not desirable for these users to have this role permanently, so I proceeded as follows:

I created a facade class for the Security.Users, Security.Roles, Security.Resources classes which allows me to log in with an authorized user on the NS %SYS

Here is an example method:

1 7
0 298

Hello,

I have a method in an operation wich return a list of %String (listId).
I call it multiple time in a Business Process and want to have all the lists I get put into one.
Not having "set context.listIdProcess = callresponse.listId" , but a way to add the elements of listId in context.listIdProcess.

There is an other way than append each element of the list?


Thanks for yours answers,

Corentin

0 7
1 298

How to import Custom Schemas from VSCode? They look like this:

<?xml version="1.0"?>
<Category name="ITK" description="xmlns:hl7='urn:hl7-org:v2xml' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'" std="1">
<MessageType name='ACK' structure='ACK' returntype='ACK' description='xsi:schemaLocation="urn:hl7-org:v2xml ACK.xsd"'/>
</Category>

Instead of wrapped XML export produced by $system.OBJ:

0 2
0 303

Hi Community,

Watch this video to get a brief overview of the near- and long-term plans for HealthShare containerization and Kubernetes adoption, as well as a preview/demo of our current progress.

The Future of HealthShare in the Cloud: Containers/ Kubernetes @ Global Summit 2022

https://www.youtube.com/embed/ZXXXnG_6SBc
[This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]

1 0
0 305

A new release of ZPM has been published 0.5.0

New in this release

  • Added support for Python's requirements.txt file
  • Using tokens for publishing packages
  • Fixed various issues

Python's requirements.txt

Now, if your project uses Python embedded and requires some Python's dependencies, you can add requirements.txt file to the project, as usual for any Python project, file have to be in the root of a project next to module.xml. And with load command or install command, ZPM will install dependencies from that file with using pip.

3 2
1 265
Question
· Aug 27, 2021
SSO Login

Hi

We have an application that is logged using AWS SSO.
We are passing username and password from the AWS SSO to our application for validating the user.
But what we need is, we need to login to application without using the password.
Is there any possible way available for this?

Thanks,
Syed M

0 1
0 304

We have a set of some fairly standard HL7 interfaces that usually end up doing about 90% of the same thing as every other interface. I'd really like to be able to write a script that I can modify some text, and have it create Services, Processes, Operations, DTL and Business Rules.

So, let me provide a more concrete example: I feel capable of a writing to and replacing variables within a text file, different process. This is obviously going to be pseudo-code, but my thinking is this

Create "Memorial Hospital Process"

Create "Memorial Hospital

0 3
0 302

Hi,

When for any particular reason I need to update a record and don't want to pull the triggers, the keyword %NOTRIGGER can be used. But I've been trying to do the same when I change the row using the object approach, but I can't find it. Anyone knows if it's possible to avoid pulling triggers when working with objects?

Sadly, the utility "DISABLE^%NOTRIGGER" doesn't seem to exist ;-)

Thank you,
David

1 2
0 303

In Episode 5 of Data Points, @Bob.Binstock9141 joins us to talk about mirroring databases for high availability in InterSystems products! Most of the discussion centers around this process in InterSystems IRIS, with a few notes about the differences when tackling it in HealthShare. Take a listen and let us know your thoughts!

https://5e18edf067eb59-03854285.castos.com/player/159215
[This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]

0 0
0 305

Hi Community,

Please welcome the new video on InterSystems Developers YouTube:

Advances in Security

https://www.youtube.com/embed/PR9OF4QleWg
[This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]

0 0
1 305