T.L. Ashford has over 30 years of experience in software development and backs that commitment with a highly qualified technical support team.
You can count on T.L. Ashford for your bar code, compliance and RFID labeling needs. Watch our video to see what Barcode400 Software can do for you. Call 800-541-4893 or use the Live Chat feature at www.tlashford.com
Want to get started with PHP on the i? Well, the first step is to download the products that are available on the i from Zend. And the first part of that is to download the Zend Server. But how? And why?
Written by David Shirey
PHP on the i. Why am I bothering to write about this? Mostly because I think we have reached a point where every RPGer and every IBM i should have some capability to do web-oriented languages. You might use Ruby or CGIDEV or even Java, but I'm a PHP fan. You might decide to learn PHP yourself and build your own scripts, or you might find real PHP programmers and have them do the work for you. What's important is that unlike a web PHP app, which can be done on your PC, PHP apps that run on the i and interface with the DB2 database on the i, are going to need a development and run environment that runs on the i itself. And the best option for that is Zend Server. But many people have an ancestral fear of words that begin with "Z," so a little encouragement may help.
San Diego Regional Center (SDRC) needed a more efficient way to support their service coordinators in the field, but wanted to maintain their trusted RPG business application. The answer: mobile applications!
Discover the positive impact mobile applications can have on your workforce! Attend this Webinar and find out how Profound UI helped SDRC:
Recently, on TechTarget's IT Knowledge Exchange site, SundarNVS entered the following request:
"Hi! I have an iSeries [sic] database table that has a column name JOBQ. I want to update all records with JOBQ value QBATCH into 2 different jobq names for alternate records. I'm a CL programmer and looking for an example of updating a column via SQL that I can call from my CL in a loop."
As the IBM i platform closes in on its silver anniversary, there are more than a few operators with ties tracing back to the very beginning. As any one of them can tell you, their roles have likely undergone more changes than the technology itself in that time.
Top Ten Security Vulnerabilities of IBM i Security Configuration
In this Webinar: SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.