Problem solve
Get help with specific problems with your technologies, process and projects.
Systems Management Tools
Strategies for securing IBM i production files
This tip offers an overview of the process for securing production files on IBM i. Learn how to best secure native objects, including data files, on the AS/400. Walk through the steps from setting system security, access strategy, object level ... Continue Reading
Translating Linux for IBM i admins: User profile commands
Linux can run on an AS/400 partition, but without understanding the commands, an IBM i admin may give up. Learn about user profile commands on Linux from an IBM i admin, including how to change passwords and assign users to groups and subgroups. Continue Reading
Checking if a local port is used by another job on AS/400
A command called NETSTAT shows who is using local ports on AS/400 but it can only be used interactively to create spooled output. Continue Reading
-
Changing BRMS configurations for new naming conventions for i5
Use BRMMED to adapt the i5 to new location names for relocated machines. Continue Reading
DAYSPAST CLLE program for AS/400: Compares object creation date with today's date
A CLLE program for AS/400 to determine the number of days that have passed since an object was created. Continue Reading
Setting up an automatic reply in the system reply list
AS/400 systems can use the system reply list to automatically reply, but only if the inquiry message reply attribute is specified as INQMSGRPY(*SYSRPYL).Continue Reading
Clearing physical member file records
If you are trying to clear a physical member file, but get a message that says: FILE *** in LIBRARY *** is in use, what do you do? Scott Ingvaldson provides a quick fix.Continue Reading
Drive space management commands
Helpful commands to manage drive space and view disk status.Continue Reading
Identifying users' system authority
How do users get the authority to run certain commands? How do you identify those users? System i security expert Carol Woodbury has the answers.Continue Reading
Run a stored procedure in AS/400 with limited profile access
ISeries security expert Carol Woodbury explains how to run a stored procedure in AS/400 while restricting the access of the profile that makes the call.Continue Reading
-
Viewing the job log of an *ALLOBJ user
ISeries security expert Carol Woodbury explains how a non-*ALLOBJ user can view the job log of a user with *ALLOBJ access.Continue Reading
Using the notification function of Advanced Job Scheduler
ISeries backup and recovery expert Ken Graap explains how to use job scheduler to send notifications using the Change Notification Command.Continue Reading
Gaining control over use of SST profiles
Expert Carol Woodbury explains the only way to extract SST profile information on iSeries servers.Continue Reading
Monitoring application of PTFs
Allowing a user to copy or create a duplicate object
An iSeries user asks expert Carol Woodbury if there is a way to allow a user to copy or create a duplicate object without giving them update rights to that object in V5R3.Continue Reading