• WebSphere Application Server: Step by Step -- Chapter 2

    As a registered member of, you're entitled to a complimentary copy of Chapter 2 of "WebSphere Application Server: Step by Step" written by Rama Turaga, Owen Cline, and Peter Van Sickel and published by MC Press. This chapter, "...  Continue Reading

  • Securing printed output

    In today's security conscious environment, most System i shops have already locked down their systems. Object level security is locked down and users are classified as to what they can and cannot do when they are logged onto the system. But, ...  Continue Reading

  • Status messages with the CEEMOUT API -- part 2

    In a recent tip, System i administrative expert Ron Turull discussed the fundamental use of the Dispatch Message (CEEMOUT) API. He also discussed its parameters and basic operations. In this tip, Ron covers the details of the API and takes a look ...  Continue Reading

  • Embracing RPG IV

    RPG IV is much more then just an extension of RPG III. Enhancements in the language provide new ways of doing things, which, in turn, necessitate a change in day-to-day coding practices.  Continue Reading

  • Telnet connections: Are yours secure?

    Security expert Rich Loeber is often amazed at how easy it is to establish a Telnet connection with another system. Rich states, "Just open a command box on your PC and enter the TELNET command along with the IP address of the system you want to ...  Continue Reading

  • Java for RPG Programmers, Third Edition -- Chapter 10

    This chapter, "Exceptions," will help you to understand the various roles of Java in today's applications, learn the core Java language, discover how to use the Java Development Kit (JDK) and much more.  Continue Reading