I showed you how to map drives to the IBM i; now I'll show you how to map drives from the IBM i.
By Tom Snyder
In my previous TechTip, I discussed the benefits and capabilities of mapping a network drive to the IBM i. In this TechTip, I will discuss the opposite perspective: how the IBM i can access external resources by mapping a drive from the IBM i.
Gmail users soon will be able to launch a video session as easily as they send an instant message.
By Chris Smith
Back in the early '90s, I used to work for Verizon when it was known as GTE. The company was in the process of computerizing a lot of its operations, and many people were bemoaning the fact that it was laying off most of its operators. Company executives foresaw a competitive landscape in the future, and they were desperately trying to figure out a way to get into broadband communications. The problem was that much of the telephone infrastructure was based on twisted-pair, and it didn't offer enough bandwidth to carry video, being designed a century earlier to handle only telephone calls.
Do your users have "limited capability," or do you just think they do?
by Carol Woodbury
You don't hear as much about the user profile setting of "limited capabilities" as you used to in the early days of OS/400. In the early releases, configuring users' initial program to launch them directly into the appropriate application as well as setting users' initial menu to *SIGNOFF and their limited capability attribute to *YES was about all an administrator had to do to make sure the data residing on an AS/400 was secure.