TechTips


Partner TechTip: Scale and Quantity: Defining QSystem Monitor's New QTEMP Monitors PDF Print E-mail
Tips & Techniques - System Administration
Written by Heather Beck   
Friday, 25 October 2013 00:00

New QTEMP monitoring provides immediate insights for library size and number of objects in those libraries.

heather beckWritten by Heather Beck

With QSystem Monitor version 13, two new options have been added to the PC user interface that allow users to monitor the count of objects in QTEMP libraries and the size of QTEMP libraries. These monitors provide immediate identification of hidden disk use and are invaluable in detecting situations in which jobs or applications may impact auxiliary storage by looping and filling up QTEMP libraries.

Add a comment
Last Updated on Thursday, 24 October 2013 15:57
Read more...
 
Partner TechTip: Get a Handle on Your Job Stream with Forecasting PDF Print E-mail
Tips & Techniques - System Administration
Written by Vivian Hall   
Monday, 21 October 2013 00:00

Trying to find a window to schedule maintenance? Need to forecast externally triggered jobs? Get a handle on your job stream with Robot/SCHEDULE.

vivian hallWritten by Vivian Hall

A Robot/SCHEDULE forecast shows you the run activity scheduled for all Robot/SCHEDULE jobs over a time period that you specify. To make its forecast, Robot/SCHEDULE uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups. If you wish, the forecast can also include a run-time analysis of each active subsystem, which uses the subsystem's description to predict job queue wait time.

Add a comment
Last Updated on Monday, 21 October 2013 08:30
Read more...
 
TechTip: Free Desktop Encryption Tool Keeps File Transfers Safe PDF Print E-mail
Tips & Techniques - Security
Written by Bob Luebbe   
Friday, 18 October 2013 00:00

Eliminate the risks involved with unsecured email attachments by using this free desktop encryption software to protect sensitive data.

bob luebbeWritten by Bob Luebbe

Here's the challenge. You need to send quarterly financial statements to your accounting firm, and you know it's risky to send those spreadsheets as an email attachment. You need a fast and easy way to encrypt that data so that you can deliver your private financial numbers securely, protected from unauthorized access.

Add a comment
Last Updated on Friday, 18 October 2013 00:00
Read more...
 
User Rating: / 1
PoorBest 
TechTip: Send and Receive Files Between Your IBM i and Dropbox PDF Print E-mail
Tips & Techniques - Document Management
Written by Arpeggio Software   
Friday, 11 October 2013 00:00

This free app may be just what you've been looking for to quickly share files with your customers and mobile staff.

Written by Arpeggio Software

Have you ever wanted to share files on Dropbox directly from your IBM i? If so, you'll find this TechTip quite useful. This article shows you how to connect to a Dropbox account to send and receive files using a free tool called ARP-DROP. ARP-DROP has many potential uses including saving/managing encrypted data backups, replacing unsecure FTP servers for file exchanges, sharing information with internal employees to access from smartphones and tablets, and sharing reports with customers.

Add a comment

Last Updated on Thursday, 10 October 2013 11:06
Read more...
 
User Rating: / 3
PoorBest 
TechTip: Get a Grip on Your IBM i Databases with IBM Data Studio PDF Print E-mail
Tips & Techniques - Database
Written by Kent Milligan   
Friday, 11 October 2013 00:00

Increase your database understanding with this free IBM tool.

kent milligan 117x117Written by Kent Milligan

Your physical database implementation plays a key role in the performance and extensibility of your application. Because the AS/400's integrated relational database was so easy to use, many programmers created physical files and logical files without giving much thought to the database model. This approach has resulted in many unwieldy physical databases that are hard to understand.

Add a comment

Last Updated on Friday, 11 October 2013 00:00
Read more...
 
TechTip: DB2 for i HTTP Functions, Part 2: Request and Response Header Fields PDF Print E-mail
Tips & Techniques - Web Languages
Written by Michael Sansoterra   
Friday, 04 October 2013 00:00

Learn how to create request header fields and parse response header fields when making HTTP calls.

Written by Michael Sansoterra

In the first tip, I introduced the new suite of HTTP functions in DB2 for i 7.1 and demonstrated the HTTPGETCLOB and HTTPGETBLOB scalar functions. I'll continue the topic by considering how to include and retrieve HTTP header information with each request. This tip assumes you have some familiarity with the new HTTP functions and with web development concepts. IBM i 7.1, DB2 PTF group SF99701 Level 23, and Java 6 are required.

Add a comment
Last Updated on Thursday, 03 October 2013 16:40
Read more...
 
User Rating: / 3
PoorBest 
TechTip: DB2 for i HTTP Functions, Part 2: Request and Response Header Fields PDF Print E-mail
Tips & Techniques - Web Languages
Written by Michael Sansoterra   
Friday, 04 October 2013 00:00

Learn how to create request header fields and parse response header fields when making HTTP calls.

Written by Michael Sansoterra

In the first tip, I introduced the new suite of HTTP functions in DB2 for i 7.1 and demonstrated the HTTPGETCLOB and HTTPGETBLOB scalar functions. I'll continue the topic by considering how to include and retrieve HTTP header information with each request. This tip assumes you have some familiarity with the new HTTP functions and with web development concepts. IBM i 7.1, DB2 PTF group SF99701 Level 23, and Java 6 are required.

Add a comment
Last Updated on Thursday, 03 October 2013 16:40
Read more...
 
Partner TechTip: Empower Your Security Monitor to Interact PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 04 October 2013 00:00

Does your organization need to step up to the next level of security monitoring?

robin tatamWritten by Robin Tatam

Let's face it, monitoring security events on IBM i probably isn't at the top of anyone's "bucket list." However, it's a critical process that should be performed by every organization to ensure that unauthorized activities don't occur unnoticed. Typically, there are two main issues with monitoring a system manually: the necessity of having to go out deliberately (and repeatedly) and check to see if something has happened, and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.

Add a comment
Last Updated on Friday, 04 October 2013 07:51
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 5 of 179

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM