MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

June 25, 2010 | Volume 7 Issue 25

ISSUE HIGHLIGHTS

TOP STORY: The CL Corner: Trim Multiple Leading Characters with TRMLFTCHR
FEATURED ARTICLE: It's Easy to Get Started in Cloud Computing
ADVERTORIAL: Partner TechTip: Limiting an *ALLOBJ User to Read-Only Data Access
NEWS HIGHLIGHT: Original Software Launches Qualify Product to Integrate Testing and Lifecycle Management
FORUM: VARLEN in DDS vs. VARCHAR in DDL
ON-DEMAND WEBCAST: Coffee with Carol - Configuring IBM i (iSeries) Access servers to use SSL
MC VIDEO NEWS MAKERS: Directions in IT
BLOG: System i Management Tips

Manage Subscription | Contact Us

Feature Article - Programming
 
The CL Corner: Trim Multiple Leading Characters with TRMLFTCHR

bruce_viningThis command can support an extensive list of trim characters.

Written by Bruce Vining

In the previous article, "Cut, Snip, Trim with TRMLFTCHR," we saw how the Trim Left Characters (TRMLFTCHR) command could allow the user to specify what leading character to trim when left-adjusting a character string value. Today, we will see what is required to have TRMLFTCHR trim any number of various leading characters from an input string of any length, left-adjust the remaining characters, and then pad the returned character string with blanks to its declared length.


Read More >>

Feature Article - Analysis
 
It's Easy to Get Started in Cloud Computing

With free, new, easy-to-use interfaces, access to cloud storage services is as simple as using Windows Explorer.

chris_smithWritten by Chris Smith

Because there can be a profound economic benefit, cloud computing is here to stay, and for those of us wishing to extend our little toes into the ethereal blue haze, there may be no better tool to start the flight into the wild blue yonder than CloudBerry Explorer.


Read More >>

Advertorial - PowerTech
 
Partner TechTip: Limiting an *ALLOBJ User to Read-Only Data Access

Grant varying levels of IBM i security to different interfaces.

robin_tatamWritten by Robin Tatam

Do the majority of your users have access to your critical data? Do you still rely on menu and command-line restrictions for security? Can you monitor network access attempts? Is your security program flexible enough to restrict access to individual objects?


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

 Search Sponsor

 

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM