• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Call Again and Again and Again…

    October 5, 2011 Paul Tuohy

    Note: The code accompanying this article is available for download here.

    In programming terms, recursion is the process whereby a function may call itself. Traditionally, this is something we are not used to in RPG. Programs and subroutines cannot call themselves. Or if you did somehow manage it (and you could), you would get unpredictable results.

    But the introduction of subprocedures opened up the possibility of using recursion because subprocedures can call themselves.

    It is usually very difficult to come up with practical examples of using recursion, and most of those examples are usually very specific to an application.

    …

    Read more
  • Another Way to Pass Parms to SBMJOB

    October 5, 2011 Bruce Guetzkow

    Note: The code accompanying this article is available for download here.

    A couple of years ago I needed to develop a process where a group of items could be selected from a screen and a report listing those items could be generated. On the surface, a simple task. Of course, if you give a mouse a cookie, they’re going to want a glass of milk, or another report. . . and another. Again, not too complicated. All that should be needed is a way to submit a call to a variable list of programs. As long as each program

    …

    Read more
  • Admin Alert: How to Retrieve Password Parameters for Auditors

    October 5, 2011 Joe Hertvik

    Your organization’s fiscal year may have ended on September 30. Meaning you could soon be visited by auditors looking for information on how your organization operates its AS/400-class machine (iSeries, System i, Power i). Your auditors will be particularly interested in your password configuration parameters and whether they meet standards. To that end, here’s a quick drill for retrieving password setup values at audit time.

    What Auditors Want

    Auditors generally require you to provide the following sets of password related parameters.

    • Your password configuration parameters–The rules users follow for creating passwords.
    • Configuration and program code for Password Validation Program
    …

    Read more
  • Call Again and Again and Again…

    October 5, 2011 Paul Tuohy

    Note: The code accompanying this article is available for download here.

    In programming terms, recursion is the process whereby a function may call itself. Traditionally, this is something we are not used to in RPG. Programs and subroutines cannot call themselves. Or if you did somehow manage it (and you could), you would get unpredictable results.

    But the introduction of subprocedures opened up the possibility of using recursion because subprocedures can call themselves.

    It is usually very difficult to come up with practical examples of using recursion, and most of those examples are usually very specific to an application.

    …

    Read more
  • Another Way to Pass Parms to SBMJOB

    October 5, 2011 Bruce Guetzkow

    Note: The code accompanying this article is available for download here.

    A couple of years ago I needed to develop a process where a group of items could be selected from a screen and a report listing those items could be generated. On the surface, a simple task. Of course, if you give a mouse a cookie, they’re going to want a glass of milk, or another report. . . and another. Again, not too complicated. All that should be needed is a way to submit a call to a variable list of programs. As long as each program

    …

    Read more
  • Admin Alert: How to Retrieve Password Parameters for Auditors

    October 5, 2011 Joe Hertvik

    Your organization’s fiscal year may have ended on September 30. Meaning you could soon be visited by auditors looking for information on how your organization operates its AS/400-class machine (iSeries, System i, Power i). Your auditors will be particularly interested in your password configuration parameters and whether they meet standards. To that end, here’s a quick drill for retrieving password setup values at audit time.

    What Auditors Want

    Auditors generally require you to provide the following sets of password related parameters.

    • Your password configuration parameters–The rules users follow for creating passwords.
    • Configuration and program code for Password Validation Program
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • No Joke: Big Memory And Flash Price Hikes Coming April 1
  • Strategic Topics To Think About For 2026, Part 2
  • Guru: IBM i Job Log Detective Brings Structure To Job Log Analysis In VS Code
  • IBM Launches Hybrid Cloud Backup Product With Cobalt Iron
  • IBM i PTF Guide, Volume 28, Number 10
  • Why You Need To Think About Offsite Data Protection
  • IBM Gets Bob 1.0 Off The Ground
  • You Store The Crown Jewels In A Safe, Not In A Bucket
  • More Power Systems Withdrawals, And Some From Red Hat, Too
  • Price Increases Are Here, Or Pending, And For Sure For Memory

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle