Nova postagem

Pesquisar

Artigo
· 13 hr atrás 3min de leitura

How to create your own search table for HL7 messaging

My intention is to show how simple it is to generate a lookup table taking into account the information received in our HL7 messaging. The HL7 message lookup table provided by IRIS is certainly sufficient for most of the searches we want to perform, but we always have that special field in our HIS, LIS, RIS, etc. that we'd like to search by. But that's in a segment outside of that lookup table. That field forces us to generate a specific search using the expanded search criteria. We'll likely have many messages, and we'll also have to filter by date and time so we don't timeout.
 

 

How do we solve this?

By generating our own search table.

And how do we generate our search table?

As we non-geniuses have always done, COPYING! In our lives, we will meet 3-4 geniuses. They will be the ones who invent, generate, visualize the afterlife, etc. If you are one of them, you already know how to do this. You'll be in the top 100 of the global masters, you'll have more than 500,000 points, and a veritable trousseau of InterSystems products in your home. The rest of us will do as we have done all these years before the chatGPT: copy, and without any shame, with our heads held high, so let's begin.

 

First Step

We will generate our class in Visual Studio Code, we will open the EnsLib.HL7.SearchTable class that IRIS gives us, and we will copy all the content of the class (CTRL+C). Then we will go to our class and paste (CTRL+V).
 

 

Super important: we will also copy the Extends, the ClassType, Inheritance. We are not leaving anything out, just the Copyright, that doesn't interest us. We don't have enough ego to leave our mark of great work.

 

 

If you're old school, this screen will seem very familiar to you 😉

 

Second Step

 

Now we do the magic: we add our fields, remove the ones we aren't interested in, and we can even translate it into Spanish to make it look better.
 

 

 

In this case, I've added the message source, destination, event, service, and patient episode, and this is where your need comes in. Add any field you want/need. As you can see, you can add the segment, field, and component numerically. For me, it's easier than adding the English name, but keep in mind that we can only guarantee that segment 1 will be the MSH; the rest will depend on each message. So, in the case of segments, it's better to use the code (PID, PV1).

After all this arduous task, we compile and now have our lookup table. We just need to assign it to the components in our production, obviously the HL7 components. Let's get to it.

 

 

Third Step

 

We open our production and look for the HL7 components, we go to the additional parameters and there we will find our lookup table, we select it and proceed to apply the changes, from that moment on, all the messages that enter through that component will be stored in our lookup table. If later we add more fields to the lookup table, it will be from the compilation of this when they will begin to be saved, and for previous messages, that field will be blank.

 

 

Whether they enter or exit, in HL7 type operations we also have the lookup table. Normally, in the output components nothing is activated by default, but if we are interested in controlling the output we also have it available.

 

 

With these simple steps we have our production ready to save the data we are interested in. We just need to generate the queries, and to do that we go to the message viewer.

 

Demonstration

 

In the messaging within the criteria, when we select the lookup tables, we will find what we did. When we select it, we can now start playing with our fields

 

 

Below, I'll give several examples, but your imagination is the limit. I'm getting carried away. The fields in the lookup table will set the limits for you.


1. Search if no condition. We only want to see the input message event and message ID.

 

 

2. Search by event showing patient and episode codes

 


3. Search by episode showing the service, patient name and HL7 message type

 

 


From here on it's up to you, enjoy 😋

Discussão (0)1
Entre ou crie uma conta para continuar
Anúncio
· 16 hr atrás

Get Certified as a Development Professional

Do you have at least two years' experience developing with InterSystems IRIS® data platform and basic knowledge of InterSystems ObjectScript?

👨‍🎓Validate your expertise with the new InterSystems IRIS Development Professional certification exam, our first professional-level exam!

Badge: InterSystems Certified. InterSystems IRIS Development Professional  


What does the exam cover?

Best practices in:

  • Architecture
  • Development lifecycle
  • Data retrieval
  • Code

Why get certified?

  • 👏 Get formal recognition of your skills and experience.
  • 🚀 Boost your confidence...and your career!

As one InterSystems-certified customer says:

...certification is a solid guarantee that you have both the breadth and the depth needed to operate efficiently in these technologies.

Discussão (0)2
Entre ou crie uma conta para continuar
Artigo
· 19 hr atrás 4min de leitura

What to Expect from an Online Quran Academy: A Complete Guide

What to Expect from an Online Quran Academy: A Complete Guide

In today’s digital age, the pursuit of Islamic knowledge has become more accessible than ever. Online Quran academies have emerged as a practical solution for individuals and families seeking quality Quranic education from the comfort of their homes. Whether you're a parent enrolling your child, a new revert to Islam, or an adult aiming to deepen your understanding of the Quran, this guide outlines exactly what you can expect from a reputable online Quran academy.


1. Flexible and Accessible Learning

One of the most appealing aspects of online Quran academies is their flexibility. With around-the-clock availability, learners can schedule classes at times that suit their personal, academic, or professional commitments.

Highlights:

  • 24/7 class scheduling
  • Learn from home—no commute required
  • Ideal for all time zones
  • Options for daily, weekly, or weekend classes

2. Qualified and Certified Instructors

Reputable academies employ instructors who are not only highly qualified in Quranic sciences, but also trained in delivering effective online instruction.

Instructor Credentials May Include:

  • Ijazah (authorization to teach the Quran)
  • Hifz (Quran memorization)
  • Proficiency in Tajweed (rules of pronunciation)
  • Multilingual capabilities (Arabic, English, Urdu, etc.)
  • Experience teaching children, adults, and reverts

3. Comprehensive Course Offerings

An online Quran academy typically offers a structured curriculum catering to students of all ages and levels, from beginners to advanced learners.

Common Programs:

  • Noorani Qaida: Foundational phonics for beginners
  • Quran Reading: Step-by-step reading with Tajweed
  • Hifz Program: Full or partial memorization
  • Tafsir & Translation: Deep understanding of meanings
  • Islamic Studies: Basic Aqeedah, Fiqh, Seerah, and Duas

Each course is designed to ensure spiritual growth, correct recitation, and a deeper connection to the Holy Quran.


4. Interactive and Modern Learning Tools

Online Quran academies use advanced digital platforms to make learning engaging and effective.

Tools Often Include:

  • Live audio/video sessions via Zoom, Skype, or proprietary apps
  • Virtual whiteboards for real-time instruction
  • Class recordings for revision
  • Regular quizzes and assessments
  • Student portals for notes and resources

5. Personalized, One-on-One Instruction

Many online Quran academies offer individualized learning plans to cater to the unique needs and pace of each student.

Key Benefits:

  • One-on-one or small group classes
  • Tailored lesson plans
  • Faster progress with focused attention
  • Direct communication with instructors

This level of personalization is especially beneficial for young children, new learners, and those seeking advanced studies.


6. Transparent Pricing and Free Trial Classes

Top academies maintain transparent pricing structures, often including a free trial period so students can evaluate the learning environment and teaching methods before committing.

Common Pricing Features:

  • Free 1–3 trial lessons
  • Affordable monthly or per-class rates
  • Family packages and discounts
  • Safe, secure online payments

7. Safe, Comfortable, and Faith-Based Environment

Studying from home not only provides convenience but also fosters a safe and distraction-free environment, particularly for children and female students who prefer gender-specific instructors.

Additional Comfort:

  • Parental supervision during sessions
  • Separate male/female tutors
  • Classes in preferred language

8. Progress Tracking and Parental Involvement

Reputable online Quran academies ensure consistent communication with parents and guardians by providing updates on student performance, attendance, and overall progress.

Tools for Monitoring:

  • Monthly progress reports
  • Attendance logs
  • Feedback sessions with instructors
  • Parent-teacher meetings (online)

Conclusion

Choosing an online Quran academy is a significant step toward enhancing your or your child’s connection with the Holy Quran. These platforms combine traditional Islamic knowledge with modern technology to offer a flexible, personalized, and enriching educational experience.

Before Enrolling, Consider:

  • Accreditation and tutor qualifications
  • Course offerings aligned with your goals
  • Reviews or testimonials
  • Free trial classes to assess compatibility
Discussão (0)1
Entre ou crie uma conta para continuar
Artigo
· Jun. 18 5min de leitura

What is a PEM Certificate File & How to Create a PEM File?

A website protected with an SSL certificate gives visitors a secure and encrypted connection. But while protecting the respective website, many technical complexities arise. Among that, one such complexity is of the.PEM file.

But what exactly is a .pem file, and how can it be used for SSL certificates? This blog is here to demystify the process for you. You'll learn how to effortlessly convert and create a .pem file for your SSL certifications.

What is a Pem file?

A few years back, security communities and Google Chrome pushed the compulsion of having SSL certificates installed. However, not every small website owner is a tech giant who knows the ins and outs of SSL certificates. And if you are also unfamiliar with the complexities of PEM files, then you are in the right place. So, let’s begin by understanding what PEM is.

Privacy Enhanced Mail or PEM file is a commonly used container format that involves cryptographic information in relation to cryptography and computer security. It contains the public certificate or the SSL chain with public and private keys, intermediate and root certificates, and end-user certificates. Also, it is a type of Public Key Infrastructure file used for certificates and keys.

PEM file starts with -

-----BEGIN <type>-----

 and ends with -

-----END <type>-----

Everything in the middle is base64 encoded(lowercase and uppercase digits,/and +), which helps in forming a block of data that is usable in other programs. A single PEM file can easily hold multiple blocks.

Although it represents all types of data, it is mainly used to encode RSA keys for SSH and certificates for SSL encryption.

Initially, PEM was to make email secure, but now it is an Internet security standard. It is a text file that carries Base64 encoding of a plain text header and footer, and certificate text. These files have extensions like  .crt, .cer, .pem, or .key.

Using separate blocks, each certificate file gets listed in a PEM file. Here’s how-

-----BEGIN CERTIFICATE-----

//end-user

-----END CERTIFICATE---

-----BEGIN CERTIFICATE-----

//intermediate

-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----

//root

-----END CERTIFICATE-----

How to Use a .pem File for SSL Certificates?

The PEM file helps store SSL certificates and their associated private key. To use a PEM file for SSL certificates, configure your web server with the apt certificate and key files.

  • Firstly, generate a .pem file, which involves the certificates issued by the SSL provider, and put them in a specific server location. It’s the file used in servers like Apache and Nginx to encrypt HTTPS.
  • For Apache, you must define the SSLCertificateKeyFile and SSLCertificateFile directives in the virtual host configuration. In Nginx, you have to define the path to the .pem file in the server configuration.

The use of a .pem text file ensures that the web server has essential SSL certificates to enable safe HTTPS encryption for your domain.

How to Open a .pem File?

With Notepad on Windows and Text Edit on macOS, you can easily open a .pem file with a text editor.

Other than that, you can open a .pem file with Certificate Viewer. In case a PEM file contains  X.509 certificates, you can use a management tool and certificate viewer to open and view the certificate.

  • For Windows, use the built-in Certificate Manager and access it by pressing Win + R, typing- msc, and hitting Enter. Lastly, import the file and view the certificate.
  • For macOS, use the Keychain Access app to import certificates.
  • For Linux, OpenSSL displays certificates from the command line. Use the following command to view a certificate in a PEM file-

             openssl x509 -in your_cert.pem -text -noout

Pro Tip: Use the ssh-keygen tool if the file contains SSH keys.

How to create a .pem file for SSL Certificate Installations

You can create a .pem file manually or via OpenSSL. If you bought the certificate from CA and opened the required SSL files and with the PEM file extension, copy and paste the content into another file. Ensure the certificate order is apt as per the provider’s guidelines.

How to Generate a .pem File With OpenSSL?

Follow these steps to generate a .pem file with OpenSSL-

  1. Install OpenSSL
  2. Open a command prompt or terminal.
  3. To generate the .pem file, navigate to the directory.
  4. Run the command - openssl req -newkey rsa:2048 -nodes -keyout private.key -out csr.csr to generate a private key and CSR.
  5. Now, run the following command: “openssl x509 -req -in csr.csr -signkey private.key -out certificate.pem” to generate the .pem file.

How to Generate a .pem File From a Private Key?

To generate this, we will use OpenSSL -

  1. Open a command prompt or terminal.
  2. Navigate to the directory using the associated private key.
  3. Run the command: openssl rsa -in private.key -outform PEM -out private.pem

With this, the command converts the private key to PEM format.

How to Get the Private Key From a .pem File?

To get the private key from OpenSSL-

  1. Open a command prompt or terminal.
  2. With the .pem file, navigate to the directory.
  3. Run the command: openssl rsa -in yourfile.pem -out privatekey.pem
  4. Change ‘yourfile.pem’ to your .pem file name.
  5. When prompted, enter the passphrase.

How to Convert a .pem File?

With OpenSSL or an external file converter tool, you can easily convert a .pem file.

How to Create a .pem File from .crt?

With a conversion process, create a .pem certificate file from a .crt file. As the .crt file is already a certificate in the PEM format, there is no requirement for additional steps to convert it. You can rename the file extension if you wish to create a .pem file from a .crt file. Just right-click the file on Windows and select “Rename.”

How to Convert a .crt File to .pem with OpenSSL

To convert .crt File to .pem with OpenSSL, follow these steps

  1. Open a command prompt or terminal.
  2. To convert the .crt file to a .pem file, use the command: openssl x509 -in your_certificate.crt -out your_certificate.pem -outform PEM.
  3. Replace your_certificate.pem with the desired name for the .pem file and your_certificate.crt with the actual name of your .crt file.

Frequently Asked Questions (FAQs)

1.    Can Windows Use .pem?

The answer is Yes. However, specific Windows applications that are related to Microsoft might require keys and certificates in another format, like .cer or .pfx. Using OpenSSL, you can convert the .pem file to these formats.

2.    Is a .pem File a Private Key?

Although it can, it does not every time. As a container format, it includes the entire certificate and public certificate chain.

Discussão (0)1
Entre ou crie uma conta para continuar
Pergunta
· Jun. 18

Databases inside a Namespace

Hi,

I want to write a program to:

- list all defined namespaces

- for each namespace, the databases making up the namespace

Python would be ideal but ObjectScript is OK.

Would someone know how to do this?

Thanks

2 novos comentários
Discussão (2)3
Entre ou crie uma conta para continuar