• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • API Corner: Database APIs

    September 28, 2005 Shannon O'Donnell

    The code for this article is available for download.

    If you want to gather some information about an OS/400 database, there are several ways you can go about it. You could use the DSPFD (Display File Description) command to display top level information about a file. Or you could use the DSPFFD (Display File Field Descriptions) command to display information about each field. However, neither command has a very convenient method of getting the resulting information into a format that can be easily used by your applications. To do that, you need to use the database APIs.

    The Database

    …

    Read more
  • SQL Record Selection with Dynamic Lists

    September 28, 2005 Ted Holt

    SQL’s IN predicate provides an easily understood, practical way to select records (rows) of a database file (table) by comparing a field’s (column’s) value to a list of predetermined values. However, when using IN with a dynamic list, i.e., a list whose values and number of values are not specified until run time, IN has a drawback, namely that the programmer must allow for the number of values in the list in advance. This article will give you three ways to deal with dynamic lists.

    But first, a brief review of the IN predicate is in order. One way to

    …

    Read more
  • Admin Alert: Limiting the Long Reach of OS/400 Security Officers

    September 28, 2005 Joe Hertvik

    It almost goes without saying that i5/OS and OS/400 administrators should limit the number of users who have security officer authority (SECOFR). In the wrong hands, SECOFR users can delete files, manipulate information for ill-gotten gains, corrupt system configurations, and compromise organizational and customer secrets. So as a general operational principle, the fewer people who possess security officer access, the better.

    But in some organizations, it isn’t enough just to limit the number of people who are security officers. You may also be required to limit where and when the few security officers you do have can sign on. This

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle