Last month, in "A CL-Based Implementation of RPG Built-in %Check," we built the command Check Characters (CHKCHR). The CHKCHR command returns the position of the first character within a CL variable that is not found within a list of valid values. Based on reader requests, this month we'll look at how to implement a Scan Characters (SCNCHR) command. The SCNCHR command will return the position of the first character within a CL variable that is found in a list of valid values.
Development environments on the IBM Power Systems (AS/400, System i, iSeries, IBM i) can be a challenge to learn, control, and document. Changes in the source code and changes in personnel are just a couple of the hurdles you must clear in order to gain and retain control of programs and files.
Because we don’t have to address the issues on a daily basis, administering the security of the IFS remains a mystery to many of us. Let Carol Woodbury de-mystify IFS security concepts and show how easy it can be to administer the security of the IFS. Using SkyView’s Policy Minder and Audit Journal Reporter products, Carol will discuss securing directories and objects in directories, controlling file shares, auditing IFS objects and more.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
Don’t “Play” with IT problems. Instead, visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers where you’ll find the widest selection of white papers, software, webcasts and more to help you resolve your worst IT issues. We’re even giving one lucky person a Sony PlayStation Vita console worth $250! Visit the MC Resource Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win that PlayStation Vita for yourself!
Have a On-Demand Webcast you would like to list? click here or call (208) 726-6822 for information.