• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Down with Dependence!

    March 28, 2012 Ted Holt

    ACME Software has just released version 1.0 of the DWIM (Do What I Mean) utility. Placing the DWIM command in your CL programs (or calling the program counterpart from programs written in other languages) will solve all your problems, because the computer will stop doing what you tell it to do and do what you intended for it to do instead. Before you start adding calls to DWIM to your programs, you might want to ponder a few questions.

    • What if ACME Software goes out of business and stops supporting DWIM?
    • What if a competitor comes out with something even better and you want to replace DWIM?
    • What if you and ACME disagree some day and your license keys no longer work?
    • What if you want to disable the software for a period of time?
    • What if you decide that DWIM is a security risk and want to remove it from your system?

    If your code is laden with multitudinous calls to DWIM, you may find yourself locked into software that you don’t want to run.

    Such a situation is called vendor lock-in, and you can avoid it by placing a program of your own (called an isolation layer) between your applications and the vendor software. In the case of DWIM, you could create a program called MYDWIM and a CL command–DOMYDWIM–to run it. All of your programs would call MYDWIM, which would call DWIM. If you decide to replace DWIM with another vendor’s software, you need modify only one program, one that you wrote and control.

    In the debate over whether to build it or buy it, I tend to favor the latter. Licensing someone else’s software usually means I get software that I don’t have the time or ability to write, and in the case of software that I could write myself, third-party software usually costs less than it would cost me in time and money. But I have regretted not including an isolation layer when using other companies’ software. Think twice before locking yourself into any vendor’s software.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Northeast User Groups Conference:  22nd Annual Conference, April 2 - 4, Framingham, MA
    COMMON:  Join us at the 2012 Conference & Expo, May 6 - 9 in Anaheim, CA
    ITJ Bookstore:  Book Blowout! Chip Wars, by Brian W. Kelly, Now 75% Off!

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    EXTOL Updates ERP Adapters, Enhances AS2 Software IBM’s Next Generation Platform Prepped For Launch

    Leave a Reply Cancel reply

Volume 12, Number 7 -- March 28, 2012
THIS ISSUE SPONSORED BY:

Help/Systems
PowerTech
IntelliChief

Table of Contents

  • A Couple of RSE Quickies
  • Down with Dependence!
  • Just When Do IBM i PTFs Get Applied, Anyway?

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle