Tips

Tips

  • Read-only tip

    Times exist when you need to allow a user to sign on the system, but not let them modify data. In other words, they need to be a "look but don't touch" or have a "read-only" profile. Unfortunately, there is no system value or user profile ...  Continue Reading

  • Indicators: Two ways to name them

    Naming your numeric indicators used in screen displays or printer files is an effective way to make your programs more readable and understandable, but did you know there are two ways it can be done? The first method is associating a data structure...  Continue Reading

  • Network/Internet security approach

    When your system is connected to a network, you cannot always guarantee the integrity of the person at the far end of a network connection. With this tip, we'll outline an approach to this problem that may help you to focus in on how to deal with ...  Continue Reading

  • Advanced trigger applications -- part 2

    A trigger program is just like any other program with a few restrictions on what it can do. In part one of this series, we discussed one of these restrictions: the trigger program's parameter list. Since the system will be calling the trigger ...  Continue Reading

  • Make the most of arrays

    In this tip Paul Tuohy examines some of the features of defining and using arrays in RPG IV.  Continue Reading

  • Choices for running Web workloads on iSeries

    Not long ago, your choices on running your company's Web workloads were limited. Today, your choices have expanded greatly on the iSeries.  Continue Reading

-ADS BY GOOGLE

SearchEnterpriseLinux

SearchDataCenter

Close