• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Creating Pivot Tables on the iSeries

    May 25, 2005 Bruce Guetzkow

    The code for this article is available for download.

    If you’ve ever used spreadsheet software, there’s a good chance that you’ve created a pivot table. Pivot tables allow you to convert rows of data into columns of data, which may be more meaningful to the end user. Creating pivot tables on the iSeries can be a complicated process. The commands demonstrated here will greatly simplify that task.

    A Pivot Table Scenario

    Before we get to the commands, let’s first describe a situation where a pivot table comes in handy. Suppose that you have a Sales History file with the

    …

    Read more
  • File Members and the Library List

    May 25, 2005 Dominic Lefevre

    What happens when an RPG or COBOL program opens a file? For one thing, the system has to find the file. And where does it look for the file? Everyone knows the answer to that question. The system searches the libraries in the library list, beginning with the system library list, proceeding through the product libraries, the current library, and finally the user libraries. The system selects the first file it finds of the desired name, right? Not necessarily.

    The exception comes when the system is searching for a certain file member. If the system does not find the desired

    …

    Read more
  • Admin Alert: Configuring Windows Desktops to Use SSO

    May 25, 2005 Joe Hertvik

    In recent issues, Admin Alert has been covering how to configure and use IBM’s Single Sign-On technology (SSO), which allows Windows domain users to automatically authenticate and authorize themselves to use i5/OS applications without entering an OS/400 user profile and password. While prior columns have covered server configurations, this final article completes the process by discussing how to configure your Windows desktop machines to use SSO.

    If your network is not already configured for SSO, be sure to read these previous three articles in the series, which cover Windows and i5/iSeries server configurations for SSO:

    • Requirements and pre-configuration tasks for
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle