Timothy Prickett Morgan
Timothy Prickett Morgan is President of Guild Companies Inc and Editor in Chief of The Four Hundred. He has been keeping a keen eye on the midrange system and server markets for three decades, and was one of the founding editors of The Four Hundred, the industry's first subscription-based monthly newsletter devoted exclusively to the IBM AS/400 minicomputer, established in 1989. He is also currently co-editor and founder of The Next Platform, a publication dedicated to systems and facilities used by supercomputing centers, hyperscalers, cloud builders, and large enterprises. Previously, Prickett Morgan was editor in chief of EnterpriseTech, and he was also the midrange industry analyst for Midrange Computing (now defunct), and its editor for Monday Morning iSeries Update, a weekly IBM midrange newsletter, and for Wednesday Windows Update, a weekly Windows enterprise server newsletter. Prickett Morgan has also performed in-depth market and technical studies on behalf of computer hardware and software vendors that helped them bring their products to the AS/400 market or move them beyond the IBM midrange into the computer market at large. Prickett Morgan was also the editor of Unigram.X, published by British publisher Datamonitor, which licenses IT Jungle's editorial for that newsletter as well as for its ComputerWire daily news feed and for its Computer Business Review monthly magazine. He is currently Principal Analyst, Server Platforms & Architectures, for Datamonitor's research unit, and he regularly does consulting work on behalf of Datamonitor's AskComputerWire consulting services unit. Prickett Morgan began working for ComputerWire as a stringer for Computergram International in 1989. Prickett Morgan has been a contributing editor to many industry magazines over the years, including BusinessWeek Newsletter for Information Executives, Infoperspectives, Business Strategy International, Computer Systems News, IBM System User, Midrange Computing, and Midrange Technology Showcase, among others. Prickett Morgan studied aerospace engineering, American literature, and technical writing at the Pennsylvania State University and has a BA in English. He is not always as serious as his picture might lead you to believe.
-
Security Architecture For Business Applications
July 7, 2015 Patrick Botz
Developers can make it infinitely less complex to manage the security of a system and can significantly improve the security of any computer system by following a simple architecture in their applications. Conversely, not following a similar architecture makes it virtually impossible for any administrator to both maintain the best security possible and avoid failed and crashed applications.
Nearly everyone in most IT shops assumes that it is the system (or security) administrator’s responsibility to manage access control for the data on the system. They also assume it is the administrator’s responsibility to fix any authority failure issues encountered by
-
How To Create Updateable Views
July 7, 2015 Ted Holt
It has been said that perception is more important than reality. I agree, especially when such perception is implemented as a view in a relational database. When creating a view, it is good to keep two things in mind.
First, consider that a view may be updateable or read-only. An updateable view allows the user to update rows in the table through the view, but also to insert new rows and delete rows. Read-only views may only be used when retrieving data. Both types of view are superb, and each type has its uses.
One strong advantage of updateable views
-
Looking For Stuff With iSphere
July 7, 2015 Susan Gantner
In my last tip I introduced you to the iSphere RDi plug-in. In this tip I’ll cover a few other features in iSphere that I find very useful. This time I’ll focus on a couple of options within iSphere that can help you search for things and subsequently edit them. The two things we’ll be searching are source members and message files.
Looking For Stuff In Source Files
Let’s start out with the iSphere Source File Search. This is a feature similar to PDM’s option 25 – Find String Using PDM (FNDSTRPDM). It lets you search for a string of
-
Reader Feedback On The AS/400 Turns 27, And Still Has Much To Teach IT
June 29, 2015 Hey, TPM
It’s unreal how often I keep bumping into you. I was intrigued by the title of the article in the attached note, followed these links, and again found an article by you. (And thanks for the reference.) I’ve shared your emotions about IBM and this system, with ever increasing sadness, from the inside.
Still, you laid down a challenge and that reminded me of something I was asked to review by an IBM friend named Phil Vitale. He asked me to review and comment on a paper he had read named The CHERI capability model: Revisiting RISC in an age
-
Take A Peek Inside PurePower Converged Systems
June 29, 2015 Timothy Prickett Morgan
When IBM sold off the System x division to Lenovo Group, one of the things that went with it was the modular Flex System chassis. Yes, IBM said it would source the machines from Lenovo and, yes, IBM said that it would continue to make and sell Power-based nodes for the Flex Systems to make its PureApplication converged systems for those customers who want them.
But the fact that there are, a year after the Power8 chips first came to market, no Flex System nodes based on the Power8 speaks volumes about just how IBM is really thinking about
-
iSphere Plug-in Expands RSE/RDi Toolset
June 25, 2015 Susan Gantner
Followers of my Guru tips know that I’m an RSE (a.k.a. RDi) fan. These days I would be lost trying to write or maintain RPG code without things like RSE’s Outline, Error feedback, editor filtering, and Undo. But you know how it is: the more you use a toolset and come to depend on all the great things it can do you for you, the more you also begin to come up with thoughts like but I sure wish it could do X. . ..
One of the great things about RDi (and its predecessors, RDP and WDSC) is
-
The AS/400 Turns 27, And Still Has Much To Teach IT
June 22, 2015 Timothy Prickett Morgan
The collective brain trust here at IT Jungle expends a lot of its intellectual and emotional energy on watching the ecosystem of customers who use the progeny of the venerable AS/400. Many of you have been using IBM midrange systems since the days of the launch of the System/38 back in the late 1970s and you have been long-time users of the systems for nearly a decade when the AS/400 made its debut on June 21, 1988, and when this platform made good on the name International Business Machines.
You will have to forgive me for still being in
-
Security Policies Vs. Security Procedures
June 16, 2015 Patrick Botz
It seems that many people don’t understand the difference between security policies and procedures. When I ask to see a customer’s security policy, if I get anything, it is usually documentation about how system security values should be set. Once in a while it contains a description about how certain tasks will be accomplished. For example, updating applications on the production system. While this kind of documentation is useful, it is not a security policy.
In short, security policy identifies acceptable and/or unacceptable uses of various business assets. Importantly, security policy shouldn’t include descriptions of how to enforce, prevent, or
-
Two Ways To Rollup
June 16, 2015 Ted Holt
In Three Powerful SQL Words, I showed how to enhance summary queries with aggregate values over subsets of grouping columns. Today I continue that discussion by showing the two syntaxes of rollup and illustrating the difference between them.
First, assume a table of accounting transactions.
select department, account, amount from xacts2 order by 1, 2 DEPARTMENT ACCOUNT AMOUNT 1 10 200.00 1 10 250.00 1 30 300.00 2 10 125.00 2 20 175.00 2 20 225.00
Here’s a typical summary query using the familiar GROUP BY clause.
select department, account, sum(amount) as tamt from xacts2 group by department, account
-
OpenPower Partners Open SuperVessel Dev Cloud
June 15, 2015 Dan Burger and Timothy Prickett Morgan
The Power Tech Open Lab in Beijing, China, is the home to the first open development cloud that IBM is firing up to help developers worldwide gain access to Power8 hybrid systems to create innovative applications. The idea is simple enough: servers ain’t cheap, but without some access to cheap or free iron, developers will stick to the X86 systems they know and can prototype on their laptops.
The development cloud, known as SuperVessel, was created by the IBM Systems Lab and IBM Research arms, which both have facilities in Beijing. (A certain portion of IBM i hardware and software