• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Creating Pivot Tables on the iSeries

    May 25, 2005 Bruce Guetzkow

    The code for this article is available for download.

    If you’ve ever used spreadsheet software, there’s a good chance that you’ve created a pivot table. Pivot tables allow you to convert rows of data into columns of data, which may be more meaningful to the end user. Creating pivot tables on the iSeries can be a complicated process. The commands demonstrated here will greatly simplify that task.

    A Pivot Table Scenario

    Before we get to the commands, let’s first describe a situation where a pivot table comes in handy. Suppose that you have a Sales History file with the

    …

    Read more
  • File Members and the Library List

    May 25, 2005 Dominic Lefevre

    What happens when an RPG or COBOL program opens a file? For one thing, the system has to find the file. And where does it look for the file? Everyone knows the answer to that question. The system searches the libraries in the library list, beginning with the system library list, proceeding through the product libraries, the current library, and finally the user libraries. The system selects the first file it finds of the desired name, right? Not necessarily.

    The exception comes when the system is searching for a certain file member. If the system does not find the desired

    …

    Read more
  • Admin Alert: Configuring Windows Desktops to Use SSO

    May 25, 2005 Joe Hertvik

    In recent issues, Admin Alert has been covering how to configure and use IBM’s Single Sign-On technology (SSO), which allows Windows domain users to automatically authenticate and authorize themselves to use i5/OS applications without entering an OS/400 user profile and password. While prior columns have covered server configurations, this final article completes the process by discussing how to configure your Windows desktop machines to use SSO.

    If your network is not already configured for SSO, be sure to read these previous three articles in the series, which cover Windows and i5/iSeries server configurations for SSO:

    • Requirements and pre-configuration tasks for
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26
  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle