I've just finished reading Development Tools in 2006: any Room for a 4GL-style Language? - a 32 page PDF report based on an in-depth 4GL usage survey Jean Georges Perrin conducted earlier this year.
As well as providing insight into how people are currently using 4GL and variant languages, the report delivers a useful comparison of features between the main products (Aubit4GL, BDS, Genero, Informix I-4GL, Rational EGL, Hydra4GL) including pros, cons and recommendations for switching (or staying put).
Also illuminating are the features people would like to see in 4GL. Some might be expected like greater web development support, but a few surprises too.
The report is well researched and presented. If you have any interest in 4GL this study is definitely worth a look.[Read More]
Administrating and Developing with Informix
Matching: 4gl X
If you are interested in being an early tester for 4GL 7.50 - which features the web services provider feature I4GL-WSP - here is an invite to join the early validation program..
Oh, and if you're interested in that, you'll also be interested in this developerWorks article published last week: Deploy 4GL functions as Web services
Early Program Announcement
The IBM Information Management team would like to invite you to participate in the early validation of IBM 4GL 7.50. We are providing some introductory information about the product and program for you to review. Please let us know if you're interested and when you are free to have an introductory call. We look forward to working with you!
The objectives of the program are to :
4GL 7.50 includes the following functionality:
Weekly technical support calls with development engineers
The major purpose of this program is to obtain feedback from customers and business partners and build references and case studies about product usage.[Read More]
So I ran into an interesting issue last week. A customer couldn't alter a table. Non-Exclusive access. Sounds pretty normal right? I mean after all it's not like a DBA doesn't see this fairly often.
The Normal routine is for a DBA to run the following:
However what happens when you still get non-exclusive access after doing the above?
You need to have two considerations then. #1, check for referential integrity issues, and #2 look for open cursors?
RI can be checked using dbaccess, or dbschema, but how do you check open cursors?
The easiest way is with
onstat -g opn
In the situation I wan into, we had several open cursors with transactions running against the child table holding RI.
This allowed us to identify where applications were forgetting to close the cursors. As soon as those cursors were closed, the alter table was successful.
From a development standpoint, this brings up a salient point to always remember, close your cursors.
For more info on onstat -g opn