• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • bsearch: A Better %LOOKUP

    February 8, 2012 Jon Paris

    Note: The code accompanying this article is available for download here.

    In qsort: A Better SORTA, I described the use of the qsort API. This time, we’ll be looking at its companion API–bsearch–which, as its name suggests, is used to perform searches.

    Recent changes in array support in RPG, including V6.1’s abilities to define large arrays, means that I use bsearch less frequently than I used to. Nevertheless, the fact that I write the code that controls the matching still makes it useful. For example, I can code bsearch to search for a partial string, which is something

    …

    Read more
  • Using JSON and RPG To Create Interactive Web 2.0 Applications

    February 8, 2012 Alex Roytman

    Note: The code accompanying this article is available for download here.

    In my last article, Meet JSON, I introduced you to the concept of JavaScript Object Notation and how it’s changing the way Web applications are being built. Let’s explore JSON syntax a little further by building a really simple customer inquiry Web application. The code can be downloaded here.

    This application consists of three simple parts:

    • CustInq.html–Simple HTML page to ask for customer number and present customer information
    • CUSTINQ.rpgle–RPG/CGI program to output customer information in JSON format
    • CustInq.js–JavaScript code to facilitate the communication between the RPG
    …

    Read more
  • Admin Alert: QSECOFR Security Problems I Have Known

    February 8, 2012 Joe Hertvik

    Handling the QSECOFR user profile is always problematic. On one hand, it’s essential for the smooth operation of your system. Conversely, it can be a major issue if someone discovers its password. This week, I’ll review some real-life QSECOFR security breaches I’ve encountered and what can be done if you encounter these situations in your shop.

    Real-Life QSECOFR Security Situations

    A lot of strange things can occur with QSECOFR usage. Here are some common situations I’ve run into over the years and what can be done, if you encounter them.

    1. Situation: Your IBM i administrator doesn’t change the QSECOFR

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle