This command can support an extensive list of trim characters.
Written by Bruce Vining
In the previous article, "Cut, Snip, Trim with TRMLFTCHR," we saw how the Trim Left Characters (TRMLFTCHR) command could allow the user to specify what leading character to trim when left-adjusting a character string value. Today, we will see what is required to have TRMLFTCHR trim any number of various leading characters from an input string of any length, left-adjust the remaining characters, and then pad the returned character string with blanks to its declared length.
With free, new, easy-to-use interfaces, access to cloud storage services is as simple as using Windows Explorer.
Written by Chris Smith
Because there can be a profound economic benefit, cloud computing is here to stay, and for those of us wishing to extend our little toes into the ethereal blue haze, there may be no better tool to start the flight into the wild blue yonder than CloudBerry Explorer.
Grant varying levels of IBM i security to different interfaces.
Written by Robin Tatam
Do the majority of your users have access to your critical data? Do you still rely on menu and command-line restrictions for security? Can you monitor network access attempts? Is your security program flexible enough to restrict access to individual objects?