TechTips


Tech Tip: Investigating CL Routing Entry Commands PDF Print E-mail
Tips & Techniques - CL
Written by David Shirey   
Friday, 05 September 2014 00:00

The i offers a variety of CL commands to help us control and subdue the i. But some of them are more familiar than others. Let's look at one particular family of commands.

david shireyWritten by David Shirey

Sometimes, on a cold winter evening, as I sit quietly in my den dressed in my favorite smoking jacket and puff contentedly on one of my favorite pipes while a fire crackles on the hearth, I like to take an obscure CL command and just investigate the living daylights out of it. Unfortunately, I also do it during the blazing hot summer when I have had a few too many Sunset Susan cocktails. And that is the case this time.

Add a comment
Last Updated on Friday, 05 September 2014 00:00
Read more...
 
User Rating: / 2
PoorBest 
Partner TechTip: Data Access on IBM i PDF Print E-mail
Tips & Techniques - Database
Written by Mike Stegeman   
Friday, 05 September 2014 00:00

Is it time to upgrade from Query/400?

mike stegemanWritten by Mike Stegeman

For over 30 years, Query/400 has been the data access tool to generate reports easily from DB2 data, allowing access to insight like never before. While it continues to be sufficient for basic reporting functionality, most organizations are beginning to be challenged with the need to access and report on larger volumes of data.

Add a comment
Last Updated on Friday, 05 September 2014 00:00
Read more...
 
TechTip: Accessing Database Files in C and C++ PDF Print E-mail
Tips & Techniques - Programming
Written by John Vriezen   
Friday, 29 August 2014 00:00

Will there always be RPG and COBOL programmers? Learn how to access files natively using C and C++. Your application’s future may depend on it.

john vriezenWritten by John Vriezen

Google "Most popular programming languages in the world," peruse the top results, and you'll find that C and C++ programming languages are consistently among the top five languages listed. For COBOL and RPG, you have to dig a little deeper. On one site, programming language popularity based upon search engine hits is reported monthly. As of August 2014, COBOL had slipped to 29th, (down from 27th in July) and RPG was lumped in with an alphabetized list of those that ranked from 51 through 100, down from 47th in July. By the time you read this, who knows where they will be.

Add a comment
Last Updated on Tuesday, 26 August 2014 09:53
Read more...
 
User Rating: / 1
PoorBest 
TechTip: Protecting Against Accidental Updates with Masked Values PDF Print E-mail
Tips & Techniques - Database
Written by Kent Milligan   
Friday, 22 August 2014 00:00

DB2 for I 7.2 delivers a feature that can increase the integrity of your database.

kent milligan 117x117Written by Kent Milligan

With the intense focus on data privacy, many applications are being modified to protect the personal data that they are processing. Masking is a data protection technique that's commonly being deployed so that the vast majority of application users are allowed to see only a masked version (############1234) of sensitive data values, such as credit card numbers. Access to the original card number value is limited to a select set of privileged users.

Add a comment
Last Updated on Friday, 22 August 2014 00:00
Read more...
 
User Rating: / 1
PoorBest 
TechTip: I Wrote My PJL Script, So Now What Do I Do? PDF Print E-mail
Tips & Techniques - Programming
Written by David Shirey   
Friday, 22 August 2014 00:00

Sometimes you need to do complex things with your prints, and PJL is one way to get it done. But how do you incorporate a PJL script into an i job stream?

david shireyWritten by David Shirey

As explained in my previous TechTip, Printer Job Language (PJL) allows you to control how the printer reacts to jobs you submit. Now the truth is that many printers will automatically figure out what the heck is going on, but not all will. As you try to use many different types of printers to carry out your assignments, you may find yourself in need of the ability to tell the stupid printer what to do. A good example might be if you wanted to add a copier to print output from the IBM i.

Add a comment
Last Updated on Friday, 22 August 2014 00:00
Read more...
 
User Rating: / 1
PoorBest 
Partner TechTip: Analyze System Security with Compliance Assessment 3.0 PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 08 August 2014 00:00

Even Power Systems can't provide the security you need right out of the box. Compliance Assessment 3.0 helps you identify shortcomings and safeguard your system.

robin tatamWritten by Robin Tatam

Security and compliance adherence has elevated in criticality over the past few years and has now taken its rightful place as a primary IT initiative, alongside virtualization and disaster preparedness. The necessity for better data protection has landed front-and-center in the public eye following some of the largest data breaches on record, including the highly publicized Target retail breach. This was the first of the national "big box" retailers to be hit with such a public and devastating attack. These stories make headlines, but thousands of lesser-publicized breaches occur every year. The threat landscape has rapidly evolved from socially and politically motivated disruptions to highly sophisticated attacks orchestrated by criminals seeking financial gain, and competitors and governments engaged in industrial and international espionage.

Add a comment
Last Updated on Thursday, 07 August 2014 10:28
Read more...
 
TechTip: Back to Basics with IBM i Special Authorities PDF Print E-mail
Tips & Techniques - Security
Written by Steve Pitcher   
Friday, 01 August 2014 00:00

Special authorities give users the access they need quickly and easily, but they're hard to take away once granted. You need to understand what you're assigning someone. Special authorities are more serious than you might have thought.

steve pitcherWritten by Steve Pitcher

With great power comes great responsibility.

 

My company is about to go on a major ERP overhaul. That's right. We've got forty plus years of a mostly home-grown solution with pieces and parts bolted on over time. Do we have people who have too much authority given their job role? Yes. Are certain objects less secure than they could be? Yes. Like any shop, we have a couple of critical applications that "might break" if the authority is changed. We also have a couple of users who "might" not be able to do their jobs if their authority is restricted. With a new solution on the horizon, it's a good time to look at what we have from a security point of view.

Add a comment
Last Updated on Monday, 04 August 2014 08:48
Read more...
 
User Rating: / 2
PoorBest 
TechTip: Make a Switch with Printer Job Language (PJL) PDF Print E-mail
Tips & Techniques - Programming
Written by David Shirey   
Friday, 25 July 2014 00:00

Do you like printing stuff? Or doing things for other people who like to print stuff? Then this tip might be just what you need, especially if you like doing complex things with your prints.

david shireyWritten by David Shirey

I'm just going to say this up front and be done with it. I don't like printers. Never have, never will. I think it dates back to the days when we had the big line printers and I was never able to get the paper lined up to suit Gloria, the night operator. It shouldn't have mattered, but I was younger then and she was hot. I have my pride. It just always seemed to me that printers were the perfect demonic combination of electronics and mechanical gears. But that's my problem, not yours.

Add a comment
Last Updated on Friday, 25 July 2014 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 5 of 185

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM