Tips

Tips

  • Watch those iSeries system values

    Security expert Rich Loeber recently installed a new i5 System i server in his office. Rich explains that this is always an exciting time and he normally rushes to get the system set up so he can move operations onto the new hardware as soon as ...  Continue Reading

  • System i modularization: How-to tips -- part 4

    Modularization is key to reaping the benefits of ILE. It is the major factor in cutting development time and increasing programmer productivity – the more effective the modularization, the more productive the programming staff. But it's ...  Continue Reading

  • Why implement System i security anyway?

    A recent survey of System i shops reports very disturbing information. While we are justifiably proud of the robust security offered by our favorite platform, when push comes to shove, it turns out that a lot of System i shops come up short on the ...  Continue Reading

  • Supporting an iSeries empire

    You're on a date with your significant other and your operator calls "The SO AND SO is down!" It is a 45-minute drive home to drop off your grumbling date. Wouldn't it be nice if you had a way to help your operator out for the five minutes of ...  Continue Reading

  • System i security policy: Time for a check up

    As a System i security officer, you've spent a lot of time doing two main tasks. First, establishing a security policy and then setting your system up to enforce that policy. Once you have these two tasks set up, then you can sit back and relax .....  Continue Reading

  • System i date conversions in RPG

    Date conversion in RPG is something that we do without too much hassle. Years ago, we'd use wacky calculations, which are now deemed harmful to proper processing. The old multiply by 100.0001 is a bad way to go. System i programming expert Andrew ...  Continue Reading

  • Making sense of the security audit journals

    To track security events on your System i, IBM has quite nicely provided an extensive security audit journal function to help you. When you have security auditing active on your system, all sorts of relevant security information is regularly stored...  Continue Reading

  • System i modularization -- part 1

    Modularization is the key to reaping the benefits of Integrated Language Environment (ILE). It is the major factor in cutting development time and increasing programmer productivity -- the more effective the modularization, the more productive the ...  Continue Reading

  • Check power user activity

    Security expert Rich Loeber regularly hears from shops where users, especially programmers, claim that they absolutely must have access to all objects to get through a normal work day. This is just not true, but some shops cave in and provide these...  Continue Reading

-ADS BY GOOGLE

SearchDataCenter

Close