Problem solve

Get help with specific problems with your technologies, process and projects.

Problem solve

Get help with specific problems with your technologies, process and projects.

  • Force AS/400 passwords to have uppercase and lowercase letters

    One Search400.com member asked, "Is there a way to force passwords in the AS/400 to have uppercase and lowercase letters? Continue Reading

  • Supporting an iSeries empire

    You're on a date with your significant other and your operator calls "The SO AND SO is down!" It is a 45-minute drive home to drop off your grumbling date. Wouldn't it be nice if you had a way to help your operator out for the five minutes of ... Continue Reading

  • System i security policy: Time for a check up

    As a System i security officer, you've spent a lot of time doing two main tasks. First, establishing a security policy and then setting your system up to enforce that policy. Once you have these two tasks set up, then you can sit back and relax ..... Continue Reading

  • System i printing: Configuring an ASCII printer

    System i printing expert Chip Milosch often comes across users with this question. "I have a XXXX ASCII printer on my network. How can I make this printer available to my iSeries users?" Thankfully Chip has been working with iSeries-AS/400 printers... Continue Reading

  • Managing Without Walls -- Chapter 7

    Transform a group of individuals working independently to achieve their own goals into a team working collaboratively to achieve the team's goals. Continue Reading

  • System i modularization -- part 3

    Modularization is key to reaping the benefits of ILE. It is the major factor in cutting development time and increasing programmer productivity -- the more effective the modularization, the more productive the programming staff. But it's important ...Continue Reading

  • Tracking System i user profile sign-on activity

    I recently received email from a reader asking me how they could track sign-on activity for their security officer user profiles. The objective was to have a record of every time someone started a terminal session from one of these very powerful ...Continue Reading

  • Learning guide: Steps to a secure System i

    This organized list will guide you along your way to maintaining a secure iSeries system. Undoubtedly, the iSeries is one of the most secure platforms out there, but don't be mistaken in thinking that it is untouchable. Address the basic security ...Continue Reading

  • System i modularization -- part 2

    Modularization is key to reaping the benefits of ILE. It is the major factor in cutting development time and increasing programmer productivity – the more effective the modularization, the more productive the programming staff. But it's ...Continue Reading

  • System i date conversions in RPG

    Date conversion in RPG is something that we do without too much hassle. Years ago, we'd use wacky calculations, which are now deemed harmful to proper processing. The old multiply by 100.0001 is a bad way to go. System i programming expert Andrew ...Continue Reading

  • Making sense of the security audit journals

    To track security events on your System i, IBM has quite nicely provided an extensive security audit journal function to help you. When you have security auditing active on your system, all sorts of relevant security information is regularly stored...Continue Reading

  • System i modularization -- part 1

    Modularization is the key to reaping the benefits of Integrated Language Environment (ILE). It is the major factor in cutting development time and increasing programmer productivity -- the more effective the modularization, the more productive the ...Continue Reading

  • Check power user activity

    Security expert Rich Loeber regularly hears from shops where users, especially programmers, claim that they absolutely must have access to all objects to get through a normal work day. This is just not true, but some shops cave in and provide these...Continue Reading

  • Stored procedures allow you to balance network loads – Part II

    In part two of this series on SQL stored procedures, Ron Turull explores how it can help optimize client/server applications, among other things, without bogging down the server. Isn't that the reason you went to client/server in the first place?Continue Reading

  • Passing parameters in an ILE RPG module

    iSeries application development expert John Blenkinsop explains about passing parameters in an ILE RPG module.Continue Reading

-ADS BY GOOGLE

SearchDataCenter

Close