Partner TechTip: File Monitoring and Other Features of Robot SCHEDULE 12 PDF Print E-mail
Tips & Techniques - System Administration
Written by Chuck Losinski   
Friday, 17 October 2014 00:00

Let's say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!

ChuckLosinski 116x116Written by Chuck Losinski

Version 12 of Robot SCHEDULE contains some helpful new features that will improve your processes and add value for your business. Perhaps the most important of these features are the new event monitors that can be set up to monitor file activity, allowing Robot SCHEDULE to react to file and directory events happening on IBM i.

Add a comment
Last Updated on Friday, 17 October 2014 00:00
TechTip: RACF Exits PDF Print E-mail
Tips & Techniques - Security
Written by Dinesh Dattani   
Friday, 10 October 2014 00:00

It's best to avoid RACF exits, but if you must have them, mitigate their risk.

dinesh dattaniWritten by Dinesh Dattani

Editor's note: This article is an excerpt from Chapter 16 of IBM Mainframe Security.


A RACF exit is an optional facility provided in RACF to perform special RACF processing, above and beyond what is offered in standard RACF. RACF exits can overrule decisions made by standard RACF processing. They provide a means for an installation to tailor RACF processing to suit its own unique needs.

Add a comment
Last Updated on Thursday, 09 October 2014 13:02
Partner TechTip: What's New in QSystem Monitor Release 6? PDF Print E-mail
Tips & Techniques - System Administration
Written by Kurt Thomas   
Friday, 03 October 2014 00:00

The new iteration of our comprehensive monitoring solution, QSystem Monitor, allows you to manage your IBM i systems even more efficiently.

kurt thomas.Written by Kurt Thomas

Here's what to expect in the new release.


Access Controls: Authority

R6 of QSystem Monitor now features a full-access control system (i.e., Authority). While QSystem Monitor has always had security in the sense that you need to specify a valid user profile and password to use the PC software, once you were past that initial hurdle you had full access to all of QSystem Monitor's configuration and any system's real-time data.

Add a comment
Last Updated on Friday, 03 October 2014 00:00
TechTip: Lock and Lock PDF Print E-mail
Tips & Techniques - CL
Written by Junlei Li   
Friday, 26 September 2014 00:00

Create your own utility to lock what the Allocate Object (ALCOBJ) command does not allow you to lock.

junlei liWritten by Junlei Li

The Allocate Object (ALCOBJ) command is used to acquire one or more lock states on each of a list of objects. The lock states are allocated to the requesting thread, its containing job (i.e., MI process), or a lock space (i.e., an MI transaction control structure (TCS) object). Generally, the ALCOBJ command and its partner, the Deallocate Object (DLCOBJ) command, can achieve tasks similar to the Lock Object (LOCK) and Unlock Object (UNLOCK) MI instructions. But not exactly.

Add a comment
Last Updated on Wednesday, 24 September 2014 13:18
Register to
User Rating: / 2
Partner TechTip: Why PowerTech Network Security 6.50? PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 19 September 2014 00:00

Users neglected the security void created by TCP/IP services for years, but exit programs can provide the robust solution today's threat environment demands.
robin tatamWritten by Robin Tatam

PowerTech Network Security, an exit program solution, was designed to fill a security void that appeared with the release of OS/400 V3R1 in the early 1990s, when IBM incorporated TCP/IP network server functionality into the Power Systems server. An exit program is an application program that is invoked before or after a user's request is performed and provides a function that the original software does not. In the case of network access, an exit program assists the operating system and should perform two critical tasks:

  • Audit the user transaction (the OS has very limited visibility to network activity)
  • Provide Access Control functions to limit backdoor data access and server functionality
Add a comment
Last Updated on Friday, 19 September 2014 00:00
RPG Academy: Parameters: What You Should Know, Part 2 PDF Print E-mail
Tips & Techniques - RPG
Written by Rafael Victoria-Pereira   
Friday, 12 September 2014 00:00

We started with VALUE. Now it's time to talk about CONST and compare the two keywords: the pros and cons and when you should use each. Even if you always use these keywords, read on. You might be surprised.

rafael victoria preiraWritten by Rafael Victória-Pereira

Let's start with a quick recap of the previous TechTip. In RPG, parameters passed between programs are, by default, passed by reference. In other words, what is passed when program A calls program B are the references to the locations (or addresses) in memory of the parameters used, not the contents of the parameters. However, when you call a procedure or a function, you're allowed to choose how the parameters should be passed.

Add a comment
Last Updated on Friday, 12 September 2014 00:00
User Rating: / 3
TechTip: A Hidden Tax with SQL Programs and SQL Packages PDF Print E-mail
Tips & Techniques - SQL
Written by Michael Sansoterra   
Friday, 12 September 2014 00:00

If your environment shares one set of embedded SQL programs or SQL packages among multiple library lists, you may be paying a performance penalty for access plan rebuilds.
Written by Michael Sansoterra

Thanks to the spectacular library list concept, it's common to have multiple instances of application data libraries on the IBM i. Further, a typical IBM i application stores its programs in one or more object libraries, separate from the data libraries. This configuration allows a single set of application programs to operate on multiple, independent data libraries.

Add a comment
Last Updated on Friday, 12 September 2014 00:00
User Rating: / 2
Tech Tip: Investigating CL Routing Entry Commands PDF Print E-mail
Tips & Techniques - CL
Written by David Shirey   
Friday, 05 September 2014 00:00

The i offers a variety of CL commands to help us control and subdue the i. But some of them are more familiar than others. Let's look at one particular family of commands.

david shireyWritten by David Shirey

Sometimes, on a cold winter evening, as I sit quietly in my den dressed in my favorite smoking jacket and puff contentedly on one of my favorite pipes while a fire crackles on the hearth, I like to take an obscure CL command and just investigate the living daylights out of it. Unfortunately, I also do it during the blazing hot summer when I have had a few too many Sunset Susan cocktails. And that is the case this time.

Add a comment
Last Updated on Friday, 05 September 2014 00:00
User Rating: / 2
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 182



See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:


  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 


Watch the Webinar Now!



MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.