TechTips


TechTip: Back to Basics with IBM i Special Authorities PDF Print E-mail
Tips & Techniques - Security
Written by Steve Pitcher   
Friday, 01 August 2014 00:00

Special authorities give users the access they need quickly and easily, but they're hard to take away once granted. You need to understand what you're assigning someone. Special authorities are more serious than you might have thought.

steve pitcherWritten by Steve Pitcher

With great power comes great responsibility.

 

My company is about to go on a major ERP overhaul. That's right. We've got forty plus years of a mostly home-grown solution with pieces and parts bolted on over time. Do we have people who have too much authority given their job role? Yes. Are certain objects less secure than they could be? Yes. Like any shop, we have a couple of critical applications that "might break" if the authority is changed. We also have a couple of users who "might" not be able to do their jobs if their authority is restricted. With a new solution on the horizon, it's a good time to look at what we have from a security point of view.

Add a comment
Last Updated on Monday, 04 August 2014 08:48
Read more...
 
User Rating: / 2
PoorBest 
TechTip: Make a Switch with Printer Job Language (PJL) PDF Print E-mail
Tips & Techniques - Programming
Written by David Shirey   
Friday, 25 July 2014 00:00

Do you like printing stuff? Or doing things for other people who like to print stuff? Then this tip might be just what you need, especially if you like doing complex things with your prints.

david shireyWritten by David Shirey

I'm just going to say this up front and be done with it. I don't like printers. Never have, never will. I think it dates back to the days when we had the big line printers and I was never able to get the paper lined up to suit Gloria, the night operator. It shouldn't have mattered, but I was younger then and she was hot. I have my pride. It just always seemed to me that printers were the perfect demonic combination of electronics and mechanical gears. But that's my problem, not yours.

Add a comment
Last Updated on Friday, 25 July 2014 00:00
Read more...
 
Partner TechTip: How SEQUEL Handles Big Data PDF Print E-mail
Tips & Techniques - Database
Written by Mike Stegeman   
Friday, 25 July 2014 00:00

Big data: A big opportunity to improve business.
mike stegemanWritten by Mike Stegeman

Big data is one of the biggest buzzwords in IT right now. A lot of companies are clamoring to set up advanced analytics tools and establish business processes that help them make sense of the troves of information now passing through their systems. The goal? To improve decision-making and be in a good position to respond to changing conditions.

Add a comment
Last Updated on Friday, 18 July 2014 10:16
Read more...
 
TechTip: Biting the Bullet: Options for DB2 for i Automated Testing PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 18 July 2014 00:00

This tip brainstorms a few approaches for automatically testing various aspects of DB2 for i code.

Written by Michael Sansoterra

In the first tip, I showed various ways to test DB2 functions, procedure results, and triggers for logic accuracy and security. However, the tip never covered how these tests, once written, are to be processed. In particular, questions such as these need further discussion:

Add a comment
Last Updated on Friday, 18 July 2014 00:00
Read more...
 
User Rating: / 2
PoorBest 
TechTip: New Function Resolution Casting Rules for DB2 PDF Print E-mail
Tips & Techniques - Database
Written by Kent Milligan   
Friday, 11 July 2014 00:00

They may be obscure, but they're definitely not to be overlooked.

kent milligan 117x117Written by Kent Milligan

My recent article on the DB2 for i 7.2 release highlighted some of the more noteworthy database enhancements in the latest IBM i release. There wasn't room in the previous article to discuss all of the DB2 enhancements, so in this article you'll learn about a smaller DB2 improvement known as function resolution casting rules.

Add a comment
Last Updated on Friday, 11 July 2014 10:26
Read more...
 
TechTip: Suggestions for DB2 for i Code Quality Testing PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 11 July 2014 00:00

Prepare to put your DB2 SQL code "through the ringer" to ensure it's ready for prime time.

Written by Michael Sansoterra

Typically, developers love writing new code. And while an application is new and business rules are fresh in the mind, it's generally pleasurable to enhance code as change requests meander in. But after the years roll on, and business requirements are forgotten, and complex code looks unfamiliar, then maintaining the code can get downright ugly. How does one know an obscure business rule wasn't violated when changing code?   It's usually not until code has been moved into production that the misery starts after a bug rears its ugly head.

Add a comment
Last Updated on Wednesday, 09 July 2014 11:30
Read more...
 
TechTip: More GridX Features PDF Print E-mail
Tips & Techniques - Programming
Written by Danielle Carmon   
Friday, 20 June 2014 00:00

In my previous article, I introduced the GridX library and a few of its features. In this article, we'll take a deeper dive into GridX features.

daniell carmonWritten by Danielle Carmon

In today's TechTip, we'll look at examples that show widgets in cells, embedded forms, and tree grids.

Add a comment
Last Updated on Friday, 20 June 2014 00:00
Read more...
 
TechTip: DB2 for i Impersonation Take 2: External Routines PDF Print E-mail
Tips & Techniques - Database
Written by Michael Sansoterra   
Friday, 13 June 2014 00:00

Use these external SQL routines as an alternative to the somewhat restrictive SET SESSION AUTHORIZATION statement.

Written by Michael Sansoterra

In "Impersonate Your Neighbor Using DB2 for i," I outlined how to use the SET SESSION AUTHORIZATION SQL statement to override the user profile of the current thread or, in many cases, the current job. The benefits of doing this include providing temporary authorization to resources such as IFS files and impersonating another user so that user-dependent code will be tricked into thinking that a different user is running it. However, there are a few restrictions on this statement that can limit its usefulness. In this tip, I'll introduce some external SQL routines (written in RPG) that allow an application to override the user profile without some of the restrictions of the built-in DB2 functionality.

Add a comment
Last Updated on Friday, 13 June 2014 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 5 of 185

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM