Is there a way to select distinct keys from an field that has a collection index? I have a field defined as follows: Property data As %Library.String(COLLATION = "EXACT", MAXLEN = "", TRUNCATE = 0); Index data On data(KEYS) [ Type = bitmap ]; And I define a build value array method that parses my data outputs an array in the format array(KEYS)=VALUES. This is very useful because I can query my data using criteria such as WHERE FOR SOME %ELEMENT(data) (%KEY='param') My question is whether there is some way to select distinct key values, e.g. SELECT DISTINCT KEYS____ FROM ____ .
Hi,
Does someone have experience with ISO-8385 transactions and Ensemble?
ISO-8385 is used for credit card transactions: https://en.wikipedia.org/wiki/ISO_8583
Thanks
Hi All,
I am trying to disable a button on a JQM application.
I started the button as disabled according to this code: {type:'$button',caption: Button',key:'button',disabled:true}
However, I would like to enable or disable the button via JavaScript code . I have tried the following, but it don´t have the same behavior and style as the code above.
var view = zen('mainView');
view.
Hi!
I am working on a project and I am facing a weird problem. I have created an MDX using Analyzer. This MDX executes very fast. I am trying to automate its execution with %DeepSee.ResultSet and the query never returns:
Set tSC = oMDX.%PrepareMDX(tMDX) Quit:$System.Status.IsError(tSC) Set tSC = oMDX.%Execute() Quit:$System.Status.IsError(tSC)
What could be causing %Execute() to take so long to run while Analyzer is responding fast?
I can see that the process that is executing the %Execute() method is on HANGW state. I am assuming that it is waiting for another process.
A client stated to me that they are trying to eliminate SMTP servers from their network and want all email to be sent through their Microsoft Exchange Server. Admittedly I am not very knowledgable of the workings of Exchange Server.
Are there customers sending email notifications through Exchange Server? How is this accomplished? Does Exchange Server act as a SMTP server allowing use of the Email adapter or is there some other mechanism that must be used to communicate with a Microsoft Exchange Server?
There seems to be little point to journal audit db updates; why rollback an audit entry for an attempted update?
I’m working on some auditing code and I have a few questions (feel free to respond regarding 2016.1 or later).
- I’ve noticed that there is little point of journaling updates to an audit database, as the Audit log is essentially an additional journal. Is there any reason not to disable journaling for audit log updates?
- I’d like to audit even transactions that get rolled back, preferably with information that the rollback occurred (this could be a second audit entry).
Welcome to the DeepSee Group.
The Developer Communty has a lot of DeepSee content including all the DeepSee documentation and over 50 videos.
Please use the Developer Community to asks questions, share your experience, and learn more about DeepSee.
I look forward to your participaton in the DeepSee Group of the InterSystems Developer Community.
Joe Gallant
Senior Product Manager
There is any mean to use different fonts? For example "Courier New" for code text, or different colors? To work only with HTML is too hard
I have had a few questions about the number of HL7 messages Ensemble can handle lately, so i thought i would draw people's attention to the benchmark report
https://community.intersystems.com/documentation/ensemble-and-healthshare-hl7v2-message-throughput-0
It describes the throughput of HL7 messages with realistic messages and routing.
Dave
I'm very proud of the Worldwide Response Center - an excellent group of men and women - and I am interested to hear from you about your experience using the WRC. There are always better ways for us to serve you.
I'm also very excited about the Developer Community which we're bringing to you to give you an opportunity to connect with groups and individuals in the InterSystems community. Let us know what you think and how we can improve it in order to serve you better.
Hello-
I am working on an Ensemble demonstration that involves workflow. Over the course of testing I have cleared out the Ensemble message store several times. This has left several workflow tasks that no longer can be assigned, accepted or rejected.
How do I clear the Workflow Tasklist which is found by going to Ensemble -> Manage -> Workflow -> Workflow Tasks in the Ensemble Management Portal?
Thanks in advance
Ken
I am using &html<> to output some CSS to my page (which is a class-based and not a tag-based page), and the selectors contain the '>' character which the compiler chokes on. How can I escape the '>' so it still displays as such in the web page source but doesn't trip up the compiler?
This is for 2012.2 btw.
Hi -
If you have Cache installed on a Cent OS machine, and you want to switch the OS to Red Hat 7, and your Caché is installed on a non-OS drive, do you need to reinstall Caché?
I don't think so, but I wanted to check
Hello DeepSee'ers -
How hard is it to brand a dashboard to a login?
The situation is, I have a Partner that is looking to create common Dashboards in a SaaS model where the Partner's Clients would want to have their individual views of this common dashbaord be branded (logos, color, styles, etc.) to match the Client's branding. This my Partner's Client's End Users will see this common dashboard as the dashboard from the "Client" and not the "Partner" (and certainly not ISC branding)
ie. ISC -> Partner -> Client -> End User
The attached zip file contains a bunch of examples of Cache SQL Storage mappings that I have done over the years.
If you have existing globals and want to expose them via Objects or SQL you need to setup Cache SQL Storage mapping. If you do not see an example that helps with your case send me an example and I can help you out.
Tip dvacátý šestý: objekty a concurrency 2 - swizzling
Když tento seriál před několika lety začínal, byl jeho první díl věnován zajištění izolace instance objektů pro exkluzivní přístup a popisu příslušných API funkcí. Nedávno se mi ale stalo, že mě tento díl dostihl. Jeden ze zákazníků začal mít problémy v aplikaci, přestože důsledně používal exkluzivní zámky pro editování instancí svých objektů.
Introduction
Australia's recent launch of the Personally Controlled Electronic Health Record (PCEHR) - a significant step towards establishing a national e-Health infrastructure - has simultaneously provided a boost to shared Electronic Patient Record (EPR) projects and delivered a wake-up call to healthcare providers about their readiness for connected care initiatives. In countries around the world, the era of connected care is here.
The PCEHR has increased both the push and pull factors that will lead to widespread shared EPR adoption.
Introduction
Impedance mismatch is a term commonly used to describe the problem of an object-oriented (OO) application housing its data in legacy relational databases (RDBMS). C++ programmers have dealt with it for years, and it is now a familiar problem to Java and other OO programmers.
Impedance mismatch arises from the inherent lack of affinity between the object and relational models.
Introduction
In healthcare, information accessibility can impact the outcome of a medical decision, or the success of a bundled payment initiative. To ensure that the right information is available at the right place and time, healthcare organizations typically have used HL7® interface engines to share data among clinical applications. But the demands on healthcare information technology are changing so rapidly that these simple engines are no longer sufficient.
Introduction
In today's world, an ever-increasing number of purchases and payments are being made by credit card. Although merchants and service providers who accept credit cards have an obligation to protect customers' sensitive information, the software solutions they use may not support "best practices" for securing credit card information. To help combat this issue, a security standard for credit card information has been developed and is being widely adopted.The Payment Card Industry (PCI) Data Security Standard (DSS) is a set of guidelines for securely handling credit card information.
Executive Summary
An accountable care organization (ACO) is a group of providers that are collectively responsible for the total cost and quality of care provided to a specific population of patients. Together, the group assumes risk and shares rewards. As with high-performing organizations in other industries, the hallmarks of ACOs are quality measurement and continuous improvement.
Like other care models that are experiencing changing reimbursement structures, ACOs require new competencies to coordinate the delivery of care, and to manage populations, finances and risk.
Introduction
Software services, in a service-oriented architecture (SOA), can be used again and again in many different business processes, making for a very flexible, efficient, and vibrant business and information technology infrastructure. Providing, of course, that IT has the right platform in place for modeling business processes and implementing the SOA. Using the InterSystems Ensemble product as an example, this paper examines two key technologies that are absolutely essential for successful SOA implementation, but missing from most SOA development platforms.
Introduction
Tying quality of care to reimbursements has been proposed in the last few years as a solution to increase the efficiency and quality of care and replace the costly and ineffective fee-for-service model. Provisions within the Affordable Care Act of 2010 have given accountable care organizations (ACOs) the foundation upon which to build real-world, value based care models.
Changes in reimbursement approaches in healthcare are unleashing unprecedented business forces in the industry. As a result, providers are consolidating into larger integrated delivery networks, hoping to achieve economies of scale and operating efficiency.
But it’s difficult to truly integrate organizations, and that’s particularly true when it comes to getting disparate information systems to work together. Overall, consolidation has become more difficult because providers now have a variety of IT systems in place.
Introduction
To overcome the performance limitations of traditional relational databases, applications - ranging from those running on a single machine to large, interconnected grids - often use in-memory databases to accelerate data access. While in-memory databases and caching products increase throughput, they suffer from a number of limitations including lack of support for large data sets, excessive hardware requirements, and limits on scalability.
Introduction
This document is intended to provide a survey of various High Availability (HA) strategies that can be used in conjunction with InterSystems Caché, Ensemble, and HealthShare Foundation. This document also provides an overview of the various types of system outages that can occur, as well as how each strategy would handle a given outage, with the goal of helping you choose the right strategy for your specific deployment.
Introduction
With the maturation and wide acceptance of Java, object-oriented programming has moved to the foreground of the application development landscape. Because of their rich data models and support for productivity-enhancing concepts such as encapsulation, inheritance, and polymorphism, object technologies like Java, C++, and COM, are favored by today's application developers.
However, much of the world's data still resides in relational databases.
Introduction
If the administrators responsible for securing applications had their way, passwords would be long complex strings of random symbols, and users would memorize different passwords for every application they use. But in the real world, few people are capable of such prodigious feats of memory. The typical user can only remember a handful of relatively short passwords.
That’s why an increasing number of applications are requiring two-factor authentication.
Introduction
In healthcare, the outcome of a life-or-death decision can depend on the available information. To help deliver the right information at the right time and place, healthcare organizations traditionally have used HL7 interface engines to share data among clinical applications.
But the world of healthcare information technology is changing so rapidly thatHL7 interface engines are no longer sufficient. The technology landscape now includes new protocols and architectures, and the business environment has changed as well.
Using Intel® Advanced Encryption Standard New Instructions with InterSystems Caché Substantially Improves Encryption Performance and Reduces Computational Overhead
Executive Summary
Financial services companies have an ever-growing need to encrypt databases containing sensitive customer and trade data. However, using encryption on these databases can require significant computational resources, potentially impacting trading latencies.

