T.L. Ashford has over 30 years of experience in software development and backs that commitment with a highly qualified technical support team.
You can count on T.L. Ashford for your bar code, compliance and RFID labeling needs. Watch our video to see what Barcode400 Software can do for you. Call 800-541-4893 or use the Live Chat feature at www.tlashford.com
This chapter presents a user-friendly CSV file upload program. While the program itself is simple, it uses some interesting procedures to recover records with the most common user errors in the CSV file. In
Last month, in Trying to Allocate an Object?, we enhanced the program AllocObj, which was first introduced in Problems Allocating an Object?. The enhancement was that the program, if run in an interactive job, would build a subfile listing those jobs with locks on the object. From this list, the user could decide to contact someone about one or more of these jobs, end one of more of these jobs, and/or cancel the current running of AllocObj.
This month, we are going to look at the batch side of AllocObj.
The IBM i no longer stands alone. It now lives harmoniously with its other server brethren. Flexible Input, Dazzling Output with IBM i shows you how to build the interfaces you need to move data between servers. The free, open-source code and tools included with the book allow you to import and export data, automate data transfers, create attractive charts and graphs easily, generate top-notch Excel spreadsheets, and much more. And it's all done with the language you know and love: RPG. Pre-order yours today!
Give your IBM i the freedom to connect to the rest of the world.
Step by Step Approach to Implementing Object Level Security
In this Webinar:More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.
As the IBM i platform closes in on its silver anniversary, there are more than a few operators with ties tracing back to the very beginning. As any one of them can tell you, their roles have likely undergone more changes than the technology itself in that time.