• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Allocating Enough System Storage to a Subsystem

    July 28, 2010 Hey, Joe

    I want to set up a private storage pool on our i/OS machine for our debit card subsystem. I want to protect its storage since we frequently time out on transactions, even when we run the programs run at priority 16. The debit card programs already run in their own subsystem, but how do I make sure the subsystem pool is getting enough memory?

    –David

    There are two ways you can approach this problem: give the subsystem a fixed amount of memory that never varies, or give the subsystem its own shared storage pool that contains a range for how

    …

    Read more
  • AAA Secures IBM i Server

    July 21, 2010 Pi Guang Ming

    The IBM HTTP Server for i, powered by Apache, has three distinct ways to handle whether a particular request for a resource will result in that resource actually being returned. These three techniques are access control, authentication, and authorization, or AAA.

    In this article, I’ll share how AAA works within IBM HTTP Server for i.

    First A: Access Control

    Access control refers to any means of controlling access to any resource. This A is distinct from authentication and authorization.

    IBM HTTP Server for i uses Allow and Deny directives to implement the criteria of access control. The Order directive

    …

    Read more
  • It’s My (De)fault That You’re a Zero

    July 21, 2010 Ted Holt

    Unless you say otherwise, numeric database fields have a value of zero and character fields are blank, right? Not necessarily. There’s more to default field values than some i Gurus realize.

    A field’s default value is the value the system assigns to the field when an application does not specify a value. Default values come into play in several situations.

    1. A record (row) is added to (inserted into) a physical file (table) by means of a logical file or SQL view that does not contain one or more fields.
    2. RPG O specs list the fields of an externally described file,
    …

    Read more
  • Admin Alert: The Poor Manager’s 5250 Single Sign-On

    July 21, 2010 Joe Hertvik

    Properly implemented, single sign-on (SSO) is a blessing for i/OS shops. With it, users log on to their desktops once and then access all their servers without entering several different passwords. But it’s always been problematic enabling SSO for Power i machines, causing some administrators to skip the process all together. This week, I’ll present a workaround for making PC5250 sessions act like single sign-on participants without configuring SSO.

    Same as Single Sign-On, Only Different

    In earlier articles, I outlined how to set up an i/OS system for single sign-on. (See Related Stories below.) A true SSO environment provides access

    …

    Read more
  • Heads Up! Additional Configuration Required for Windows 7/Windows Server 2008 R2

    July 14, 2010 Patrick Botz

    If you have a Windows 7 workstation or you are running Windows Server 2008 R2, there is an extra configuration step to enable Kerberos authentication with i5/OS. In these releases, Microsoft no longer enables the DES cipher suites (DES-CBC-MD5 and DES-CBC-CRC) for Kerberos by default. Unfortunately, Kerberos on i5/OS does not support the new default suites used by Microsoft.

    A few details about the Kerberos protocol will explain why this change requires additional configuration. The Kerberos protocol negotiates the cipher suites used to build Kerberos tickets. When a client requests a Kerberos ticket, it includes a list of cipher suites

    …

    Read more
  • Who’s the Scoundrel That Corrupted My Database?

    July 14, 2010 Dear Guru

    Yes, I’m talking to you. You who read this newsletter are gurus. Devoted and profoundly resourceful reader Sarah showed me a tip that I’ve got to share with you. Her technique makes it easy to find out who’s doing what with the database.

    Sometimes a user asks Sarah to determine who changed something in a file. The journal tells all. The problem is that journals are not easy to read. The data is stored in one big long field, called entry-specific data. However, Sarah has a way to break down the entry-specific data as it is defined in the database.

    …

    Read more
  • Admin Alert: Keep Your Data Synced Up During an HA Switch Over

    July 14, 2010 Joe Hertvik

    When performing high availability (HA) switch exercises where production processing is temporarily switched from a live system to an HA system and back again, there is one essential procedure that must be followed or you risk screwing up your databases and losing data. Here’s the issue and how to avoid it.

    Rule #1: Don’t Do This!!!

    In my humble opinion, this is the cardinal rule for an HA switch over:

    Don’t update your production data without replication running.

    It’s a good simple rule to follow, but it’s also an easy rule to mess up. Whenever you switch processing from a

    …

    Read more
  • Generic Database Access with .NET 2.0

    June 30, 2010 Michael Sansoterra

    A difficult task for developers is to foresee how an application may evolve in the future. As we all know, sometimes the unrealistic becomes reality. Say you have an application that will start on SQL Server and possibly later be moved to DB2 for i or vice versa. How do you create a data-centric application in .NET that isn’t tied to a particular database server? The answer lies in writing “database-agnostic” code.

    Let’s back up for a moment to when .NET was in its infancy. When .NET was first released, each ADO.NET database provider had its own set of classes.

    …

    Read more
  • Spaces, Braces, and Semicolons

    June 30, 2010 Hey, Ted

    My Qshell script would work perfectly if I could make it count correctly. It thinks I have more objects in library QGPL than I really do have. Can you help?

    –Hugo

    Today is a spectacular day to improve our Qshell skills, thus improving our Unix and Linux shell skills and beefing up our résumés.

    Here is Hugo’s Qshell command:

    find /qsys.lib/qgpl.lib/ -name '*' | wc -l
    

    The “find” utility produces a list of everything (-name ‘*’) in QGPL. The list is passed along to the “wc” utility, which counts the number of lines (-l) in the list. The problem is

    …

    Read more
  • Admin Alert: High Availability Eliminates Disaster Recovery. . . Right?

    June 30, 2010 Joe Hertvik

    Imagine you’re a flea with one limitation. Whenever you want to go anywhere, you can only jump half the distance to your objective and no further. The second hop halves the remaining distance. The third halves that again, and so on. How long will it take to reach your goal? Administrators dealing with High Availability (HA) and Disaster Recovery (DR) are a lot like that flea.

    I thought of the jumping flea after we started revisiting our DR plan. I was feeling pretty smug about things. After all, I have an off-site HA setup for my production Power i machine,

    …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle